23
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks Difficulties in defending against these attacks 1

Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks

Embed Size (px)

Citation preview

Page 1: Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks

Security Awareness

Challenges of Securing Information

• No single simple solution to protecting computers and securing information

• Different types of attacks

• Difficulties in defending against these attacks

1

Page 2: Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks

Today’s Security Attacks

• Typical monthly security newsletter– Malicious programs– E-mail attachments– ‘‘Booby-trapped’’ Web pages are growing at an

increasing rate– Mac computers can be the victim of attackers

2

Page 3: Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks

Today’s Security Attacks (cont’d.)

• Security statistics– 45 million credit and debit card numbers stolen– Number of security breaches continues to rise

3

Page 4: Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks

Difficulties in Defending Against Attacks

• Speed of attacks

• Greater sophistication of attacks

• Simplicity of attack tools

• Quicker detection of vulnerabilities– Zero day attack

• Delays in patching products

• Distributed attacks

• User confusion

4

Page 5: Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks

Difficulties in Defending Against Attacks (cont’d.)

5

Difficulties in defending against attacks

Page 6: Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks

Defining Information Security

• Information security – Tasks of guarding information that is in a digital

format– Ensures that protective measures are properly

implemented– Protect information that has value to people and

organisations• Value comes from the characteristics of the

information

6

Page 7: Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks

Defining Information Security (cont’d.)

• Characteristics of information that must be protected by information security– Confidentiality– Integrity– Availability

• Achieved through a combination of three entities– Products– People– Procedures

7

Page 8: Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks

Understanding the Importance of Information Security

• Preventing data theft– Theft of data is one of the largest causes of financial

loss due to an attack– Affects businesses and individuals

• Thwarting identity theft– Identity theft

• Using someone’s personal information to establish bank or credit card accounts

8

Page 9: Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks

Who Are the Attackers?

• Divided into several categories– Hackers– Script kiddies– Spies– Employees– Cybercriminals– Cyberterrorists

9

Page 10: Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks

Hackers

• Debated definition of hacker– Identify anyone who illegally breaks into or attempts

to break into a computer system– Person who uses advanced computer skills to attack

computers only to expose security flaws• ‘‘White Hats’

10

Page 11: Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks

Script Kiddies

• Unskilled users

• Use automated hacking software

• Do not understand the technology behind what they are doing

• Often indiscriminately target a wide range of computers

11

Page 12: Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks

Spies

• Person who has been hired to break into a computer and steal information

• Do not randomly search for unsecured computers

• Hired to attack a specific computer or system

• Goal – Break into computer or system – Take the information without drawing any attention to

their actions

12

Page 13: Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks

Employees

• Reasons for attacks by employees– Show company weakness in security– Retaliation– Money– Blackmail– Carelessness

13

Page 14: Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks

Cybercriminals

• Loose-knit network of attackers, identity thieves, and financial fraudsters

• Motivated by money

• Financial cybercrime categories– Stolen financial data– Spam email to sell counterfeits, etc.

14

Page 15: Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks

Cyberterrorists

• Motivated by ideology

15

Page 16: Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks

Attacks and Defences

• Same basic steps are used in most attacks

• Protecting computers against these steps– Calls for five fundamental security principles

16

Page 17: Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks

Steps of an Attack

• Probe for information

• Penetrate any defences

• Modify security settings

• Circulate to other systems

• Paralyse networks and devices

17

Page 18: Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks

Defences Against Attacks

• Layering– If one layer is penetrated, several more layers must

still be breached– Each layer is often more difficult or complicated than

the previous– Useful in resisting a variety of attacks

• Limiting– Limiting access to information reduces the threat

against it– Technology-based and procedural methods

18

Page 19: Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks

Defences Against Attacks (cont’d.)

• Diversity– Important that security layers are diverse– Breaching one security layer does not compromise

the whole system

• Obscurity– Avoiding clear patterns of behavior make attacks

from the outside much more difficult

• Simplicity– Complex security systems can be hard to

understand, troubleshoot, and feel secure about

19

Page 20: Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks

Building a Comprehensive Security Strategy

• Block attacks– Strong security perimeter

• Part of the computer network to which a personal computer is attached

– Local security important too

• Update defences– Continually update defenses to protect information

against new types of attacks

20

Page 21: Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks

Building a Comprehensive Security Strategy (cont’d.)

• Minimise losses– Realise that some attacks will get through security

perimeters and local defenses– Make backup copies of important data– Business recovery policy

• Send secure information– ‘‘Scramble’’ data so that unauthorized eyes cannot

read it– Establish a secure electronic link between the

sender and receiver

21

Page 22: Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks

Summary

• Attacks against information security have grown exponentially in recent years

• Difficult to defend against today’s attacks

• Information security definition– That which protects the integrity, confidentiality, and

availability of information

• Main goals of information security – Prevent data theft, thwart identity theft, avoid the

legal consequences of not securing information, maintain productivity, and foil cyberterrorism

22

Page 23: Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks

Summary (cont’d.)

• Several types of people are typically behind computer attacks

• Five general steps that make up an attack

• Practical, comprehensive security strategy involves four key elements

23