SlideShare une entreprise Scribd logo
1  sur  24
Information Security
PRESENTED BY : - ANKIT KUMAR MISHRA
ROHIT GIR
The art of war teaches us to rely not on the likelihood of the enemy’s not coming,
but on our own readiness to receive him; not on the chance of his not attacking,
but rather on the fact that we have made our position unassailable.
—The Art of War, Sun Tzu
Information Security (IS)
 Information :-
 when raw facts and figures are processed
 Communicate meaningful/understandable sentence
 Security :-
 Degree of resistance or protection from harm
 As quoted by Institute for Security and Open Methodologies (ISECOM)
 “a form of protection where a separation is created between the assets and the threat”
Information Security (cont.)
 “Preservation of confidentiality, integrity and availability of information. Note: In addition,
other properties, such as authenticity, accountability, non-repudiation and reliability can
also be involved.” (ISO/IEC 27000:2009)
 “The protection of information and information systems from unauthorized access, use,
disclosure, disruption, modification, or destruction in order to provide confidentiality,
integrity, and availability.” (CNSS, 2010)
Note :- IEC – International Electro-technical Commission
ISO – International Organization for Standard
CNSS – Committee on National Security Systems
Terminologies
 Confidentiality: In information security, confidentiality "is the property, that
information is not made available or disclosed to unauthorized individuals,
entities, or processes" (Excerpt ISO27000).
 Integrity: In information security, data integrity means maintaining and assuring
the accuracy and completeness of data over its entire life-cycle. This means that
data cannot be modified in an unauthorized or undetected manner. This is not the
same thing as referential integrity in databases, although it can be viewed as a
special case of consistency as understood in the classic ACID model of transaction
processing. Information security systems typically provide message integrity in
addition to data confidentiality.
Terminologies (cont.)
 Availability: For any information system to serve its purpose, the information must be available
when it is needed. This means that the computing systems used to store and process the
information, the security controls used to protect it, and the communication channels used to
access it must be functioning correctly. High availability systems aim to remain available at all
times, preventing service disruptions due to power outages, hardware failures, and system
upgrades. Ensuring availability also involves preventing denial-of-service attacks, such as a
flood of incoming messages to the target system essentially forcing it to shut down.
 Non-repudiation: In law, non-repudiation implies one's intention to fulfil their obligations to a
contract. It also implies that one party of a transaction cannot deny having received a
transaction nor can the other party deny having sent a transaction. Note: This is also regarded
as part of Integrity.
Threat level
 Low: The loss could be expected to have a limited adverse effect on organizational operations,
organizational assets, or individuals. A limited adverse effect means that, for example, the loss of
confidentiality, integrity, or availability might (i) cause a degradation in mission capability to an extent
and duration that the organization is able to perform its primary functions, but the effectiveness of
the functions is noticeably reduced; (ii) result in minor damage to organizational assets; (iii) result in
minor financial loss; or (iv) result in minor harm to individuals.
 Moderate: The loss could be expected to have a serious adverse effect on organizational operations,
organizational assets, or individuals. A serious adverse effect means that, for example, the loss might
(i) cause a significant degradation in mission capability to an extent and duration that the
organization is able to perform its primary functions, but the effectiveness of the functions is
significantly reduced; (ii) result in significant damage to organizational assets; (iii) result in significant
financial loss; or (iv) result in significant harm to individuals that does not involve loss of life or
serious, life-threatening injuries.
Threat level (cont.)
 High: The loss could be expected to have a severe or catastrophic adverse effect
on organizational operations, organizational assets, or individuals. A severe or
catastrophic adverse effect means that, for example, the loss might (i) cause a
severe degradation in or loss of mission capability to an extent and duration that
the organization is not able to perform one or more of its primary functions; (ii)
result in major damage to organizational assets; (iii) result in major financial loss;
or (iv) result in severe or catastrophic harm to individuals involving loss of life or
serious, life-threatening injuries.
Penetration testing(Pentest) Phases
 Phase 1 – Reconnaissance
 Phase 2 – Scanning
 Phase 3 – Gaining Access
 Phase 4 – Maintaining Access
 Phase 5 – Covering Tracks
Phase 1 – Reconnaissance
 longest phase
 Information gained through
 Internet searches
 Social engineering
 Dumpster diving
 Dumpster diving is looking for treasure in someone else's trash. (A dumpster is a large trash
container.)
 treasures like access codes or passwords written down on sticky notes, phone list, calendar, or
organizational chart can be used to assist an attacker using social engineering techniques
What enables the enlightened rulers and good generals to conquer the enemy at every move
and achieve extraordinary success is foreknowledge.
—Sun-tzu
Phase 1 – Reconnaissance (cont.)
 Employees are often easily tricked
 For providing tidbits of information which, over time, act to complete a complete picture of
processes, organizational structure, and potential soft-spots
 Non-intrusive network scanning
 Don't alert them
 Domain name management/search services
 WhoIS
Phase 1 – Reconnaissance (Prevention)
 Make sure your systems don't leak information to the Web, including:
 Software versions and patch levels
 Email addresses
 Names and positions of key personnel
 Ensure proper disposal of printed information
 Provide generic contact information for domain name registration lookups
 Like company info. and contact
 Prevent perimeter LAN/WAN devices from responding to scanning attempts
Phase 2 – Scanning
 Open ports
 Open services
 Vulnerable applications, including operating systems
 Weak protection of data in transit
 Make and model of each piece of LAN/WAN equipment
Phase 2 – Scanning (cont.)
Phase 3 - Gaining Access
 Modern-day attack
 to either extract information of value to the attacker or use the network as a
launch site for attacks against other targets
Phase 3 - Gaining Access (cont.)
Phase 3 - Gaining Access (Prevention)
 Physical security controls should
 detect attempts at a hands-on attack
 delay an intruder long enough to allow effective internal or external human response
(i.e., security guards or law enforcement).
 Security managers should make every effort to ensure end-user devices and
servers are not easily accessible by unauthenticated users.
 denying local administrator access to business users
 closely monitoring domain and local admin access to servers
Phase 3 - Gaining Access (Prevention)
 encrypt highly sensitive information and protect keys
 Even if network security is weak, scrambling information and denying attacker
access to encryption keys is a good final defence when all other controls fail. But
don't rely on encryption alone.
 There are other risks due to weak security, such as system unavailability or use of
your network in the commission of a crime.
Phase 4 - Maintaining Access
 Having gained access, an attacker must maintain access long enough to
accomplish his or her objectives. Although an attacker reaching this phase has
successfully circumvented your security controls, this phase can increase the
attacker's vulnerability to detection.
 Detect and filter file transfer content to external sites or internal devices
 Look for connections to odd ports or nonstandard protocols
 Prevent/detect direct session initiation between servers in your data centre and
networks/systems not under your control
Phase 4 - Maintaining Access (cont.)
Phase 5 – Covering Tracks
 After achieving his or her objectives, the attacker typically takes steps to hide the
intrusion and possible controls left behind for future visits. Again, in addition to
anti-malware, personal firewalls, and host-based IPS solutions, deny business users
local administrator access to desktops.
 Alert on any unusual activity, any activity not expected based on your knowledge
of how the business works. To make this work, the security and network teams
must have at least as much knowledge of the network as the attacker has
obtained during the attack process.
Why is IS needed?
 We need information security to reduce the risk of unauthorized information
disclosure, modification, and destruction.
 We need information security to reduce risk to a level that is acceptable to the
business (management).
 We need information security to improve the way we do business.
“
”
If you know the enemy and know yourself, you need
not fear the result of a hundred battles. If you know
yourself but not the enemy, for every victory gained
you will also suffer a defeat. If you know neither the
enemy nor yourself, you will succumb in every
battle.
― SUN TZU, THE ART OF WAR
Any Questions
Information security

Contenu connexe

Tendances

Ancaman & kelemahan server
Ancaman & kelemahan serverAncaman & kelemahan server
Ancaman & kelemahan server
Dedi Dwianto
 
CS5032 L20 cybersecurity 2
CS5032 L20 cybersecurity 2CS5032 L20 cybersecurity 2
CS5032 L20 cybersecurity 2
Ian Sommerville
 
Insider threat webinar slides no cn
Insider threat webinar slides   no cnInsider threat webinar slides   no cn
Insider threat webinar slides no cn
DevOps.com
 
Eidws 107 information assurance
Eidws 107 information assuranceEidws 107 information assurance
Eidws 107 information assurance
IT2Alcorn
 
Risk Analysis Report review
Risk Analysis Report reviewRisk Analysis Report review
Risk Analysis Report review
Larry Yurdin
 
CS 5032 L12 security testing and dependability cases 2013
CS 5032 L12  security testing and dependability cases 2013CS 5032 L12  security testing and dependability cases 2013
CS 5032 L12 security testing and dependability cases 2013
Ian Sommerville
 
Security communication
Security communicationSecurity communication
Security communication
Say Shyong
 
CS5032 L9 security engineering 1 2013
CS5032 L9 security engineering 1 2013CS5032 L9 security engineering 1 2013
CS5032 L9 security engineering 1 2013
Ian Sommerville
 

Tendances (20)

Network security
Network securityNetwork security
Network security
 
Ancaman & kelemahan server
Ancaman & kelemahan serverAncaman & kelemahan server
Ancaman & kelemahan server
 
Computer security
Computer securityComputer security
Computer security
 
CS5032 L20 cybersecurity 2
CS5032 L20 cybersecurity 2CS5032 L20 cybersecurity 2
CS5032 L20 cybersecurity 2
 
Insider threat webinar slides no cn
Insider threat webinar slides   no cnInsider threat webinar slides   no cn
Insider threat webinar slides no cn
 
Eidws 107 information assurance
Eidws 107 information assuranceEidws 107 information assurance
Eidws 107 information assurance
 
Network Security Risk
Network Security RiskNetwork Security Risk
Network Security Risk
 
Lect13 security
Lect13   securityLect13   security
Lect13 security
 
Risk Analysis Report review
Risk Analysis Report reviewRisk Analysis Report review
Risk Analysis Report review
 
CS 5032 L12 security testing and dependability cases 2013
CS 5032 L12  security testing and dependability cases 2013CS 5032 L12  security testing and dependability cases 2013
CS 5032 L12 security testing and dependability cases 2013
 
201408 fire eye korea user event press roundtable
201408 fire eye korea user event   press roundtable201408 fire eye korea user event   press roundtable
201408 fire eye korea user event press roundtable
 
Global Ransomware Attacks
Global Ransomware AttacksGlobal Ransomware Attacks
Global Ransomware Attacks
 
Understanding Cyber Attack - Cyber Kill Chain.pdf
Understanding Cyber Attack - Cyber Kill Chain.pdfUnderstanding Cyber Attack - Cyber Kill Chain.pdf
Understanding Cyber Attack - Cyber Kill Chain.pdf
 
Security communication
Security communicationSecurity communication
Security communication
 
Enhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 datasetEnhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 dataset
 
Unit 7
Unit 7Unit 7
Unit 7
 
CS5032 L9 security engineering 1 2013
CS5032 L9 security engineering 1 2013CS5032 L9 security engineering 1 2013
CS5032 L9 security engineering 1 2013
 
Cybersecurity a short business guide
Cybersecurity   a short business guideCybersecurity   a short business guide
Cybersecurity a short business guide
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1
 

En vedette

Public Policy and Public Opinion
Public Policy and Public OpinionPublic Policy and Public Opinion
Public Policy and Public Opinion
Jacqueline Faerman
 

En vedette (10)

きちんと成果を出す ソーシャルメディア組み合わせ 実践テクニック
きちんと成果を出す ソーシャルメディア組み合わせ 実践テクニックきちんと成果を出す ソーシャルメディア組み合わせ 実践テクニック
きちんと成果を出す ソーシャルメディア組み合わせ 実践テクニック
 
Linda Greenwood - Artist Showcase - Event Postcard
Linda Greenwood - Artist Showcase - Event PostcardLinda Greenwood - Artist Showcase - Event Postcard
Linda Greenwood - Artist Showcase - Event Postcard
 
Facebookセミナーを地域別キーワードでseoした検証結果
Facebookセミナーを地域別キーワードでseoした検証結果Facebookセミナーを地域別キーワードでseoした検証結果
Facebookセミナーを地域別キーワードでseoした検証結果
 
How can restaurants leverage twitter and instagram
How can restaurants leverage twitter and instagramHow can restaurants leverage twitter and instagram
How can restaurants leverage twitter and instagram
 
Software educativo
Software educativoSoftware educativo
Software educativo
 
Public Policy and Public Opinion
Public Policy and Public OpinionPublic Policy and Public Opinion
Public Policy and Public Opinion
 
Resume
ResumeResume
Resume
 
Twitterのアプリ単体(Periscope無し)でライブ配信が可能へ
Twitterのアプリ単体(Periscope無し)でライブ配信が可能へTwitterのアプリ単体(Periscope無し)でライブ配信が可能へ
Twitterのアプリ単体(Periscope無し)でライブ配信が可能へ
 
Social Media Marketing for Restaurants
Social Media Marketing for RestaurantsSocial Media Marketing for Restaurants
Social Media Marketing for Restaurants
 
Лекция 9. Модули, пакеты и система импорта.
Лекция 9. Модули, пакеты и система импорта.Лекция 9. Модули, пакеты и система импорта.
Лекция 9. Модули, пакеты и система импорта.
 

Similaire à Information security

ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...
ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...
ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...
Shanmuganathan C
 
Network security-S.Karthika II-M.Sc computer science,Bon Securous college for...
Network security-S.Karthika II-M.Sc computer science,Bon Securous college for...Network security-S.Karthika II-M.Sc computer science,Bon Securous college for...
Network security-S.Karthika II-M.Sc computer science,Bon Securous college for...
karthikasivakumar3
 

Similaire à Information security (20)

ch01_overview_nemo.ppt
ch01_overview_nemo.pptch01_overview_nemo.ppt
ch01_overview_nemo.ppt
 
ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...
ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...
ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...
 
ch01_overview_nemo.ppt
ch01_overview_nemo.pptch01_overview_nemo.ppt
ch01_overview_nemo.ppt
 
ch01_overview.ppt
ch01_overview.pptch01_overview.ppt
ch01_overview.ppt
 
ch01_overview.ppt
ch01_overview.pptch01_overview.ppt
ch01_overview.ppt
 
Ch01 overview nemo
Ch01 overview nemoCh01 overview nemo
Ch01 overview nemo
 
ch01_overview_nemo.ppt
ch01_overview_nemo.pptch01_overview_nemo.ppt
ch01_overview_nemo.ppt
 
Network security-S.Karthika II-M.Sc computer science,Bon Securous college for...
Network security-S.Karthika II-M.Sc computer science,Bon Securous college for...Network security-S.Karthika II-M.Sc computer science,Bon Securous college for...
Network security-S.Karthika II-M.Sc computer science,Bon Securous college for...
 
OPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYOPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITY
 
Module 3 - Information Assurance Concepts.pdf
Module 3 - Information Assurance Concepts.pdfModule 3 - Information Assurance Concepts.pdf
Module 3 - Information Assurance Concepts.pdf
 
Chapter- I introduction
Chapter- I introductionChapter- I introduction
Chapter- I introduction
 
Aspects of Network Security
Aspects of Network SecurityAspects of Network Security
Aspects of Network Security
 
M.Florence Dayana/Cryptography and Network security
M.Florence Dayana/Cryptography and Network securityM.Florence Dayana/Cryptography and Network security
M.Florence Dayana/Cryptography and Network security
 
Security in network computing
Security in network computingSecurity in network computing
Security in network computing
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
security IDS
security IDSsecurity IDS
security IDS
 
Cyber Crime and Security Ch 1 .ppt
Cyber Crime and Security Ch 1 .pptCyber Crime and Security Ch 1 .ppt
Cyber Crime and Security Ch 1 .ppt
 
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUEScompTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
 
Protection and security
Protection and securityProtection and security
Protection and security
 
ch01_nemo-Pendahuluan.ppt
ch01_nemo-Pendahuluan.pptch01_nemo-Pendahuluan.ppt
ch01_nemo-Pendahuluan.ppt
 

Dernier

Dernier (20)

SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 

Information security

  • 1. Information Security PRESENTED BY : - ANKIT KUMAR MISHRA ROHIT GIR
  • 2. The art of war teaches us to rely not on the likelihood of the enemy’s not coming, but on our own readiness to receive him; not on the chance of his not attacking, but rather on the fact that we have made our position unassailable. —The Art of War, Sun Tzu
  • 3. Information Security (IS)  Information :-  when raw facts and figures are processed  Communicate meaningful/understandable sentence  Security :-  Degree of resistance or protection from harm  As quoted by Institute for Security and Open Methodologies (ISECOM)  “a form of protection where a separation is created between the assets and the threat”
  • 4. Information Security (cont.)  “Preservation of confidentiality, integrity and availability of information. Note: In addition, other properties, such as authenticity, accountability, non-repudiation and reliability can also be involved.” (ISO/IEC 27000:2009)  “The protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability.” (CNSS, 2010) Note :- IEC – International Electro-technical Commission ISO – International Organization for Standard CNSS – Committee on National Security Systems
  • 5. Terminologies  Confidentiality: In information security, confidentiality "is the property, that information is not made available or disclosed to unauthorized individuals, entities, or processes" (Excerpt ISO27000).  Integrity: In information security, data integrity means maintaining and assuring the accuracy and completeness of data over its entire life-cycle. This means that data cannot be modified in an unauthorized or undetected manner. This is not the same thing as referential integrity in databases, although it can be viewed as a special case of consistency as understood in the classic ACID model of transaction processing. Information security systems typically provide message integrity in addition to data confidentiality.
  • 6. Terminologies (cont.)  Availability: For any information system to serve its purpose, the information must be available when it is needed. This means that the computing systems used to store and process the information, the security controls used to protect it, and the communication channels used to access it must be functioning correctly. High availability systems aim to remain available at all times, preventing service disruptions due to power outages, hardware failures, and system upgrades. Ensuring availability also involves preventing denial-of-service attacks, such as a flood of incoming messages to the target system essentially forcing it to shut down.  Non-repudiation: In law, non-repudiation implies one's intention to fulfil their obligations to a contract. It also implies that one party of a transaction cannot deny having received a transaction nor can the other party deny having sent a transaction. Note: This is also regarded as part of Integrity.
  • 7. Threat level  Low: The loss could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals. A limited adverse effect means that, for example, the loss of confidentiality, integrity, or availability might (i) cause a degradation in mission capability to an extent and duration that the organization is able to perform its primary functions, but the effectiveness of the functions is noticeably reduced; (ii) result in minor damage to organizational assets; (iii) result in minor financial loss; or (iv) result in minor harm to individuals.  Moderate: The loss could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals. A serious adverse effect means that, for example, the loss might (i) cause a significant degradation in mission capability to an extent and duration that the organization is able to perform its primary functions, but the effectiveness of the functions is significantly reduced; (ii) result in significant damage to organizational assets; (iii) result in significant financial loss; or (iv) result in significant harm to individuals that does not involve loss of life or serious, life-threatening injuries.
  • 8. Threat level (cont.)  High: The loss could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals. A severe or catastrophic adverse effect means that, for example, the loss might (i) cause a severe degradation in or loss of mission capability to an extent and duration that the organization is not able to perform one or more of its primary functions; (ii) result in major damage to organizational assets; (iii) result in major financial loss; or (iv) result in severe or catastrophic harm to individuals involving loss of life or serious, life-threatening injuries.
  • 9. Penetration testing(Pentest) Phases  Phase 1 – Reconnaissance  Phase 2 – Scanning  Phase 3 – Gaining Access  Phase 4 – Maintaining Access  Phase 5 – Covering Tracks
  • 10. Phase 1 – Reconnaissance  longest phase  Information gained through  Internet searches  Social engineering  Dumpster diving  Dumpster diving is looking for treasure in someone else's trash. (A dumpster is a large trash container.)  treasures like access codes or passwords written down on sticky notes, phone list, calendar, or organizational chart can be used to assist an attacker using social engineering techniques What enables the enlightened rulers and good generals to conquer the enemy at every move and achieve extraordinary success is foreknowledge. —Sun-tzu
  • 11. Phase 1 – Reconnaissance (cont.)  Employees are often easily tricked  For providing tidbits of information which, over time, act to complete a complete picture of processes, organizational structure, and potential soft-spots  Non-intrusive network scanning  Don't alert them  Domain name management/search services  WhoIS
  • 12. Phase 1 – Reconnaissance (Prevention)  Make sure your systems don't leak information to the Web, including:  Software versions and patch levels  Email addresses  Names and positions of key personnel  Ensure proper disposal of printed information  Provide generic contact information for domain name registration lookups  Like company info. and contact  Prevent perimeter LAN/WAN devices from responding to scanning attempts
  • 13. Phase 2 – Scanning  Open ports  Open services  Vulnerable applications, including operating systems  Weak protection of data in transit  Make and model of each piece of LAN/WAN equipment
  • 14. Phase 2 – Scanning (cont.)
  • 15. Phase 3 - Gaining Access  Modern-day attack  to either extract information of value to the attacker or use the network as a launch site for attacks against other targets
  • 16. Phase 3 - Gaining Access (cont.)
  • 17. Phase 3 - Gaining Access (Prevention)  Physical security controls should  detect attempts at a hands-on attack  delay an intruder long enough to allow effective internal or external human response (i.e., security guards or law enforcement).  Security managers should make every effort to ensure end-user devices and servers are not easily accessible by unauthenticated users.  denying local administrator access to business users  closely monitoring domain and local admin access to servers
  • 18. Phase 3 - Gaining Access (Prevention)  encrypt highly sensitive information and protect keys  Even if network security is weak, scrambling information and denying attacker access to encryption keys is a good final defence when all other controls fail. But don't rely on encryption alone.  There are other risks due to weak security, such as system unavailability or use of your network in the commission of a crime.
  • 19. Phase 4 - Maintaining Access  Having gained access, an attacker must maintain access long enough to accomplish his or her objectives. Although an attacker reaching this phase has successfully circumvented your security controls, this phase can increase the attacker's vulnerability to detection.  Detect and filter file transfer content to external sites or internal devices  Look for connections to odd ports or nonstandard protocols  Prevent/detect direct session initiation between servers in your data centre and networks/systems not under your control
  • 20. Phase 4 - Maintaining Access (cont.)
  • 21. Phase 5 – Covering Tracks  After achieving his or her objectives, the attacker typically takes steps to hide the intrusion and possible controls left behind for future visits. Again, in addition to anti-malware, personal firewalls, and host-based IPS solutions, deny business users local administrator access to desktops.  Alert on any unusual activity, any activity not expected based on your knowledge of how the business works. To make this work, the security and network teams must have at least as much knowledge of the network as the attacker has obtained during the attack process.
  • 22. Why is IS needed?  We need information security to reduce the risk of unauthorized information disclosure, modification, and destruction.  We need information security to reduce risk to a level that is acceptable to the business (management).  We need information security to improve the way we do business.
  • 23. “ ” If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle. ― SUN TZU, THE ART OF WAR Any Questions