SlideShare une entreprise Scribd logo
1  sur  50
Applications Theory Slideshows

Threats to data and
information

y Mark Kelly, mark@vceit.com, ,

Vceit.com
Contents
• Deliberate actions
• Accidental actions
• Technical failure
… during …
• Storage
• Communication
• Disposal
Examples
Accidental

Deliberate

Tech Failure

-Jostling a computer when
HDD active
- Damaging a DVD
- Fire

-Illicitly copying
data
-Theft of computer

-Hard disk failure
- Unreliable storage
media (e.g. bad
DVD)
-Power failure

Communic -Files/emails are sent to the
ation
wrong person

-Intercepting
private data
-Infecting files with
viruses, trojans

- Damage to
packets during
transmission

Disposal

- Deleting
someone’s valuable
data

Storage

- Deleting the wrong file or
folder
Deliberate Actions
•
•
•
•
•
•
•
•
•
•
•

Viruses / worms
Trojans
Rootkits
Malware = Adware, spyware
Theft of computers and data
Espionage
Hackers
Disgruntled employees
Denial of Service attacks
Phishing
Internet scams
Viruses / worms
• Viruses attach to EXE files – rare now
• Worms travel in email – self-contained.
Common now.
• Must have reliable antivirus scanner running
with up-to-date virus/worm definitions
• Free ones (Avira, AVG etc) often just as good
as the big-name ones.
Malware
• Malware = ‘Malicious software’ = Adware,
spyware
• Adware – tracks internet use to target ads at
users. Not usually malicious, but often badly
written and buggy: slows computers down or
crashes them.
• Spyware – deliberately, stealthily monitors users’
actions and can redirect web surfing, change
internet settings, disable firewalls etc.
• Named after the Trojan
Horse
• Pretends to be harmless
software – actually is
malicious
• Hides itself from detection
• Often hidden in illegal
downloads
• Can be picked up on
malicious websites (“drive-by
download”)

Trojans
Trojans (continued)
• Trojan “Payload” can include:
– Keylogger – steals passwords, credit card #, bank
details
– Spam server – forces victim PC to send spam
– DDOS – becomes ‘zombie computer’ participating
in Distributed Denial of Service attack.
• Installed secretly
• Very hard to detect and
remove – they hide.
• Originally used to monitor
software or music licensing
• Gains very intimate access to
operating system
• Risky if hacker can take over a
rootkit and use its intimate
access to the OS for the
hacker’s benefit. (This has
already happened)

Rootkits
Theft of computers and data
• Thieves probably just want the computer, but
unique & valuable data is lost with the PC
• Sensitive data can be leaked
• Laptops, smartphones, USB hard disks, Flash
drives are particularly easy to steal (or
carelessly leave behind)
• Tip: don’t use a laptop bag that
makes its contents obvious to
everyone.
Prevention
• Physical security
– fences
– locked doors
– bars on windows
– alarms
– video surveillance
– fire detectors
– fire extinguishers
– armed guards
– guard dogs
Prevention
• Physical security (continued)
– security cables or cradles to bolt down or tie
computers to furniture
– locks on computer cases so they can't be opened
and hard disks removed
– glue up USB ports to prevent portable massstorage devices being plugged in
– removal of floppy disk drives & optical drives from
file server to prevent the loading of hacking tools
– UPS (uninterruptible power supply)
– simple cable ties to lock mouse cable to a
computer to discourage theft
Prevention

Procedural security
• Not letting the public near computers
• Not letting the public see what’s on the screen
• Never logging in with an outsider watching
• Shredding all paper waste
Prevention

Procedural security
• Staff hand in keys before going on holiday
• Change passwords regularly
• Never give passwords over the phone or in
email
• Never open unexpected attachments
• Monitor email to detect suspiciously large data
exports or sending of passwords
• Mandate the use of corporate procedures for
backups, filenaming etc.
Prevention
Electronic security
• Usernames and passwords on computer
startup, operating system, databases, Office
documents
• Audit trails
• Encryption
• Biometric identification
Biometric Identification
• Keys and passwords only prove someone
possesses the key or password, not that they
are entitled to use them.
• Keys, passwords etc can be stolen, copied,
lost, forgotten – fingerprints, eyes cannot.
• Biometric ID ensures that a person requesting
access is actually the person who was granted
access
Biometric Identification:

100% unique and unchanging
features*

• Fingerprints
• Retinal scans (blood vessels at the back of
the eye)
• Iris scans (coloured part at the front of the
eye)
• Hand vein pattern
*Yes – even between identical twins.
Less reliable biometric features:
not unique,
or may change over time
• Face recognition
– You’ve seen lookalikes

• Voice recognition
– Easy to imitate voices

• Walk (gait) recognition
– Can be rehearsed
Prevention
Electronic security
• Use swipe cards instead of keys
– Most hotels use them now
– Cards can be deauthorised immediately
when lost or if a person is considered to
be a risk
– Can be programmed to only open
certain doors at certain times of day
(e.g. not after 5pm or on weekends or
when its user is on holidays)
Espionage
• Political – can threaten national security
• Industrial – steal competitor’s secrets
• Encryption can make stolen data useless to
unauthorised people. See:
– SSL
– RSA, PGP
– Public Key encryption
Hackers
• Motives used to be fame, achievement, kudos
• Usually now organised crime rings aiming to
steal money
Hackers
• Hackers can control PCs compromised by
Trojans – steal bank account info, credit card
numbers, passwords etc
• Will sell the info or use it themselves
• Defence = firewall to prevent hacker
activating or being reported to by an installed
Trojan
Firewalls
• Block most of the 65,535 communication ports
that are usually open and can be entered by
hackers
• Make a computer invisible to port sniffing
software
• Built into most home routers – good & easy
protection from incoming threats
Firewalls
• Software firewalls (e.g. Zone Alarm) also block
unauthorised outgoing traffic (e.g. a trojan
mailing its keylogger data back to a hacker)
• Software firewalls can need training to teach
them what programs are allowed to send data.
Disgruntled employees
• ‘Disgruntled’ = sulky, dissatisfied,
seeking revenge (e.g. just been fired or
yelled at)
• Can do harm with carelessness or
active malice
• May steal data to hurt employer
and offer to new employer
• Solution: remove network/data access
privileges before sacking people!
• Audit trails record all network actions
& who was responsible.
Distributed Denial of Service
attack

• Usually set up by hacker taking control of
zombie PCs infected by Trojan
• Hacker can direct many zombies to bombard
server with Pings or data requests to the point
it can’t cope and cannot work properly
Distributed Denial of Service
attack
• DDOS often aimed at political, religious,
personal enemies
• Not many defences against DDOS: keep
server’s NOS up to date and security holes
patched.
Phishing
• ‘Social engineering’
• Depends on gullibility of
victims
• Often uses scare tactics, e.g.
– Your bank account has been
compromised
– This (fake) Paypal transaction
has happened
– You need to verify your login
Phishing
• Can be convincing – fake website logins look
real
• Solution: educate employees; never click a
link in a suspicious email
Internet scams
• Rely on victim’s humanity (e.g. fake charities)
or greed (e.g. Nigerian ‘419’ scam)
• People give bank account info or donate
directly
• Can be physical risk if scammers lure victim to
their country and hold them hostage
• Solution: educate users; don’t
believe ‘too good to be true’
offers
Accidental actions
• Incompetent employees
• "Misplaced" data
• Natural disasters
Incompetent employees
• One of the most common threats to data
• Poorly-trained staff destroy more data
than any number of hackers
• Good intentions won’t bring back
deleted data
• Train users fully; give good
documentation
Incompetent employees
• Only give users enough access to data so
they can do their job (hierarchical data
access) – limits the damage they can do
• Use good software that makes mistakes
harder to make
"Misplaced" data
• Poor file handling procedures can lead to files
being impossible to find without huge
searches
• May not be destroyed, but data is equally
inaccessible.
• Solution: properly planned and enforced file
and folder naming scheme
• Version control – to prevent overwriting
recent documents with old data.
‘Natural’ disasters
• E.g. fire, flood, earthquake, falling tree,
runaway truck, power surge, riot, war,
lightning
• Uninterruptible Power Supply (UPS) can filter
out dangerous power surges to protect
hardware, and cope with blackouts
• Disaster may not be
preventable, but can be
recovered from with a good
data disaster recovery plan…
Disaster Recovery Plan
• Relies on backups.
• Effective backups must be:
– Regular (incremental daily, full backup weekly)
– Tested (with sample data, not real data!)
– Stored offsite

• Key recovery info should also be stored offsite
– Insurance company, policy number etc
– Details of backup software and hardware to allow
restore
– etc
Disaster Recovery Plan
• Any DDRP must be tested to find weaknesses
or omissions
– Perform test restores of backed up data
– Practice fire drills
– Ensure that the emergency administrator
password works
– Test smoke alarms, burglar alarms
– Ensure emergency contacts list is up to date
– etc
Technical Failure
• Hardware failure (e.g. hard disk crash, file
server failure)
• Operating system failure
• Software failure
Hardware Failure
• Typically: hard disk, power supplies (moving
parts age quickly)
• Also: circuit boards (solder joints dry out and
break)
• Solution: redundant equipment (e.g. two
power supplies, NICs)
• Solution: good environment
– Air conditioned server room
– UPS to prevent power surges
Software Failure
• OS crash or application failure can cause data
loss if work in progress has not been saved
recently
• Not likely to damage any hardware
• Can waste time and cause annoyance
• Solution: save frequently!
Consequences of ignoring safety
measures
• Loss of valuable data that can’t be replaced at
all, or only with huge effort and cost
• Competitors finding out your secrets
• Damage to or loss of expensive equipment
• Financial loss through misuse of credit cards
or bank accounts
Consequences
• Unwitting participation in illegal actions such
as spamming or DDOS attacks
• Loss of reputation through negligently letting
customer information go public
• Penalties by the tax office for not having
proper GST or tax records
• Prosecution under the Privacy Act if sensitive
information is not properly protected.
Consequences
• Loss of income when unable to do business
due to system failure
• Total failure of the organisation after
catastrophic data loss

• Organisational death.
Remember
• No system is 100% invulnerable
• If someone is sufficiently determined to get in,
they will
• No one protection measure is perfect
• A combination of simple measures is very
powerful…
Remember
• Implement protection against the most likely
risks:
– Do good backups
– Lock doors
– Use strong passwords
– Run antivirus software
– Use a router and firewall
– Train staff against phishing and opening attachments

• Such simple measures will mean 99.99%
protection
Remember in U4O2
• Recommend sensible
strategies that are
appropriate to the
organisation in the case
study.
• Don’t invent outlanding,
unlikely risks that are not in
the case study.
• Forget the 24x7 armed guard
protecting the fish & chip
shop’s PC.
• Forget the ceiling-mounted
Criteria for evaluating the effectiveness of data
security management strategies.
Notes: RTQ (Read The Question)
criteria, not methods
evaluating, not testing
effectiveness, not efficiency

• How well the strategies protect data from being
deliberately or accidentally stolen, damaged or
lost.
• How easily lost or damaged data can be
restored.
Criteria for evaluating the effectiveness of data
security management strategies.
• How easy the strategies are to carry out.
• Accuracy of risk detection
– e.g. number of virus infections or hacking attempts
that were correctly detected and acted upon)
Criteria for evaluating the effectiveness of data
security management strategies.
• Timeliness of reactions to threats
– Did a defence strategy operate in time to prevent a
detected threat
– e.g. did a UPS kick in quickly enough to stop a power
surge or loss of power?
– E.g. did a firewall block a port sniffing before a hacker
could do any harm?
IT APPLICATIONS SLIDESHOWS
By Mark Kelly
mark@vceit.com
vceit.com
These slideshows may be freely used, modified or distributed by teachers and students
anywhere on the planet (but not elsewhere).
They may NOT be sold.
They must NOT be redistributed if you modify them.

Contenu connexe

Tendances

Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss PreventionNicholas Davis
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionNicholas Davis
 
The Perimeter Protection Issues, Technique and Operation
The Perimeter Protection Issues, Technique and OperationThe Perimeter Protection Issues, Technique and Operation
The Perimeter Protection Issues, Technique and OperationHafiza Abas
 
Pentesting embedded
Pentesting embeddedPentesting embedded
Pentesting embeddedantitree
 
Corporate Intelligence: Bridging the security and intelligence community
Corporate Intelligence: Bridging the security and intelligence communityCorporate Intelligence: Bridging the security and intelligence community
Corporate Intelligence: Bridging the security and intelligence communityantitree
 
Basic security concepts_chapter_1
Basic security concepts_chapter_1Basic security concepts_chapter_1
Basic security concepts_chapter_1abdifatah said
 
Basic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpageBasic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpagenakomuri
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comAravind R
 
Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Anna Stirling
 
Securing embedded systems
Securing embedded systemsSecuring embedded systems
Securing embedded systemsaissa benyahya
 
Brochure protect operational_info_sm1
Brochure protect operational_info_sm1Brochure protect operational_info_sm1
Brochure protect operational_info_sm1Noel Waterman
 
Understanding computer investigation
Understanding computer investigationUnderstanding computer investigation
Understanding computer investigationOnline
 

Tendances (19)

Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss Prevention
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss Prevention
 
The Perimeter Protection Issues, Technique and Operation
The Perimeter Protection Issues, Technique and OperationThe Perimeter Protection Issues, Technique and Operation
The Perimeter Protection Issues, Technique and Operation
 
Pentesting embedded
Pentesting embeddedPentesting embedded
Pentesting embedded
 
Corporate Intelligence: Bridging the security and intelligence community
Corporate Intelligence: Bridging the security and intelligence communityCorporate Intelligence: Bridging the security and intelligence community
Corporate Intelligence: Bridging the security and intelligence community
 
Basic security concepts_chapter_1
Basic security concepts_chapter_1Basic security concepts_chapter_1
Basic security concepts_chapter_1
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
 
Basic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpageBasic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpage
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Harshit security
Harshit securityHarshit security
Harshit security
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.com
 
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
 
Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Discovering Computers: Chapter 11
Discovering Computers: Chapter 11
 
Securing embedded systems
Securing embedded systemsSecuring embedded systems
Securing embedded systems
 
Brochure protect operational_info_sm1
Brochure protect operational_info_sm1Brochure protect operational_info_sm1
Brochure protect operational_info_sm1
 
Understanding computer investigation
Understanding computer investigationUnderstanding computer investigation
Understanding computer investigation
 
How to become Hackers .
How to become Hackers .How to become Hackers .
How to become Hackers .
 
MADS6638
MADS6638MADS6638
MADS6638
 
Hackers Cracker Network Intruder
Hackers Cracker Network IntruderHackers Cracker Network Intruder
Hackers Cracker Network Intruder
 

Similaire à Threats

Threats to data and information security
Threats to data and information securityThreats to data and information security
Threats to data and information securityJohn LEE
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfMansoorAhmed57263
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptOoXair
 
Security and privacy
Security and privacySecurity and privacy
Security and privacyMohammed Adam
 
Anti Whaling Hardening Up Your Net Presence
Anti   Whaling   Hardening Up Your Net PresenceAnti   Whaling   Hardening Up Your Net Presence
Anti Whaling Hardening Up Your Net PresenceEngineers Australia
 
Anti Whaling Hardening Up Your Net Presence
Anti   Whaling   Hardening Up Your Net PresenceAnti   Whaling   Hardening Up Your Net Presence
Anti Whaling Hardening Up Your Net Presencegueste0b5fe
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Vibrant Event
 
The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…Christopher Kranich
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptxAmbuj Kumar
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProRonald Soh
 
Understanding the need for security measures
Understanding the need for security measuresUnderstanding the need for security measures
Understanding the need for security measuresjoy grace bagui
 
Recommending information security measures
Recommending information security measuresRecommending information security measures
Recommending information security measuresManish Singh
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handlingnewbie2019
 
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos De Pedro
 
Presentation cyber forensics & ethical hacking
Presentation   cyber forensics & ethical hackingPresentation   cyber forensics & ethical hacking
Presentation cyber forensics & ethical hackingAmbuj Kumar
 

Similaire à Threats (20)

Data security
Data securityData security
Data security
 
Threats to data and information security
Threats to data and information securityThreats to data and information security
Threats to data and information security
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
css ppt.ppt
css ppt.pptcss ppt.ppt
css ppt.ppt
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
 
Anti Whaling Hardening Up Your Net Presence
Anti   Whaling   Hardening Up Your Net PresenceAnti   Whaling   Hardening Up Your Net Presence
Anti Whaling Hardening Up Your Net Presence
 
Anti Whaling Hardening Up Your Net Presence
Anti   Whaling   Hardening Up Your Net PresenceAnti   Whaling   Hardening Up Your Net Presence
Anti Whaling Hardening Up Your Net Presence
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptx
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
Understanding the need for security measures
Understanding the need for security measuresUnderstanding the need for security measures
Understanding the need for security measures
 
Recommending information security measures
Recommending information security measuresRecommending information security measures
Recommending information security measures
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handling
 
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1
 
Drooger, jack cyber security
Drooger, jack   cyber securityDrooger, jack   cyber security
Drooger, jack cyber security
 
Presentation cyber forensics & ethical hacking
Presentation   cyber forensics & ethical hackingPresentation   cyber forensics & ethical hacking
Presentation cyber forensics & ethical hacking
 

Dernier

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 

Dernier (20)

Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 

Threats

  • 1. Applications Theory Slideshows Threats to data and information y Mark Kelly, mark@vceit.com, , Vceit.com
  • 2. Contents • Deliberate actions • Accidental actions • Technical failure … during … • Storage • Communication • Disposal
  • 3. Examples Accidental Deliberate Tech Failure -Jostling a computer when HDD active - Damaging a DVD - Fire -Illicitly copying data -Theft of computer -Hard disk failure - Unreliable storage media (e.g. bad DVD) -Power failure Communic -Files/emails are sent to the ation wrong person -Intercepting private data -Infecting files with viruses, trojans - Damage to packets during transmission Disposal - Deleting someone’s valuable data Storage - Deleting the wrong file or folder
  • 4. Deliberate Actions • • • • • • • • • • • Viruses / worms Trojans Rootkits Malware = Adware, spyware Theft of computers and data Espionage Hackers Disgruntled employees Denial of Service attacks Phishing Internet scams
  • 5. Viruses / worms • Viruses attach to EXE files – rare now • Worms travel in email – self-contained. Common now. • Must have reliable antivirus scanner running with up-to-date virus/worm definitions • Free ones (Avira, AVG etc) often just as good as the big-name ones.
  • 6. Malware • Malware = ‘Malicious software’ = Adware, spyware • Adware – tracks internet use to target ads at users. Not usually malicious, but often badly written and buggy: slows computers down or crashes them. • Spyware – deliberately, stealthily monitors users’ actions and can redirect web surfing, change internet settings, disable firewalls etc.
  • 7. • Named after the Trojan Horse • Pretends to be harmless software – actually is malicious • Hides itself from detection • Often hidden in illegal downloads • Can be picked up on malicious websites (“drive-by download”) Trojans
  • 8. Trojans (continued) • Trojan “Payload” can include: – Keylogger – steals passwords, credit card #, bank details – Spam server – forces victim PC to send spam – DDOS – becomes ‘zombie computer’ participating in Distributed Denial of Service attack.
  • 9. • Installed secretly • Very hard to detect and remove – they hide. • Originally used to monitor software or music licensing • Gains very intimate access to operating system • Risky if hacker can take over a rootkit and use its intimate access to the OS for the hacker’s benefit. (This has already happened) Rootkits
  • 10. Theft of computers and data • Thieves probably just want the computer, but unique & valuable data is lost with the PC • Sensitive data can be leaked • Laptops, smartphones, USB hard disks, Flash drives are particularly easy to steal (or carelessly leave behind) • Tip: don’t use a laptop bag that makes its contents obvious to everyone.
  • 11. Prevention • Physical security – fences – locked doors – bars on windows – alarms – video surveillance – fire detectors – fire extinguishers – armed guards – guard dogs
  • 12. Prevention • Physical security (continued) – security cables or cradles to bolt down or tie computers to furniture – locks on computer cases so they can't be opened and hard disks removed – glue up USB ports to prevent portable massstorage devices being plugged in – removal of floppy disk drives & optical drives from file server to prevent the loading of hacking tools – UPS (uninterruptible power supply) – simple cable ties to lock mouse cable to a computer to discourage theft
  • 13. Prevention Procedural security • Not letting the public near computers • Not letting the public see what’s on the screen • Never logging in with an outsider watching • Shredding all paper waste
  • 14. Prevention Procedural security • Staff hand in keys before going on holiday • Change passwords regularly • Never give passwords over the phone or in email • Never open unexpected attachments • Monitor email to detect suspiciously large data exports or sending of passwords • Mandate the use of corporate procedures for backups, filenaming etc.
  • 15. Prevention Electronic security • Usernames and passwords on computer startup, operating system, databases, Office documents • Audit trails • Encryption • Biometric identification
  • 16. Biometric Identification • Keys and passwords only prove someone possesses the key or password, not that they are entitled to use them. • Keys, passwords etc can be stolen, copied, lost, forgotten – fingerprints, eyes cannot. • Biometric ID ensures that a person requesting access is actually the person who was granted access
  • 17. Biometric Identification: 100% unique and unchanging features* • Fingerprints • Retinal scans (blood vessels at the back of the eye) • Iris scans (coloured part at the front of the eye) • Hand vein pattern *Yes – even between identical twins.
  • 18. Less reliable biometric features: not unique, or may change over time • Face recognition – You’ve seen lookalikes • Voice recognition – Easy to imitate voices • Walk (gait) recognition – Can be rehearsed
  • 19. Prevention Electronic security • Use swipe cards instead of keys – Most hotels use them now – Cards can be deauthorised immediately when lost or if a person is considered to be a risk – Can be programmed to only open certain doors at certain times of day (e.g. not after 5pm or on weekends or when its user is on holidays)
  • 20. Espionage • Political – can threaten national security • Industrial – steal competitor’s secrets • Encryption can make stolen data useless to unauthorised people. See: – SSL – RSA, PGP – Public Key encryption
  • 21. Hackers • Motives used to be fame, achievement, kudos • Usually now organised crime rings aiming to steal money
  • 22. Hackers • Hackers can control PCs compromised by Trojans – steal bank account info, credit card numbers, passwords etc • Will sell the info or use it themselves • Defence = firewall to prevent hacker activating or being reported to by an installed Trojan
  • 23. Firewalls • Block most of the 65,535 communication ports that are usually open and can be entered by hackers • Make a computer invisible to port sniffing software • Built into most home routers – good & easy protection from incoming threats
  • 24. Firewalls • Software firewalls (e.g. Zone Alarm) also block unauthorised outgoing traffic (e.g. a trojan mailing its keylogger data back to a hacker) • Software firewalls can need training to teach them what programs are allowed to send data.
  • 25. Disgruntled employees • ‘Disgruntled’ = sulky, dissatisfied, seeking revenge (e.g. just been fired or yelled at) • Can do harm with carelessness or active malice • May steal data to hurt employer and offer to new employer • Solution: remove network/data access privileges before sacking people! • Audit trails record all network actions & who was responsible.
  • 26. Distributed Denial of Service attack • Usually set up by hacker taking control of zombie PCs infected by Trojan • Hacker can direct many zombies to bombard server with Pings or data requests to the point it can’t cope and cannot work properly
  • 27. Distributed Denial of Service attack • DDOS often aimed at political, religious, personal enemies • Not many defences against DDOS: keep server’s NOS up to date and security holes patched.
  • 28. Phishing • ‘Social engineering’ • Depends on gullibility of victims • Often uses scare tactics, e.g. – Your bank account has been compromised – This (fake) Paypal transaction has happened – You need to verify your login
  • 29. Phishing • Can be convincing – fake website logins look real • Solution: educate employees; never click a link in a suspicious email
  • 30. Internet scams • Rely on victim’s humanity (e.g. fake charities) or greed (e.g. Nigerian ‘419’ scam) • People give bank account info or donate directly • Can be physical risk if scammers lure victim to their country and hold them hostage • Solution: educate users; don’t believe ‘too good to be true’ offers
  • 31. Accidental actions • Incompetent employees • "Misplaced" data • Natural disasters
  • 32. Incompetent employees • One of the most common threats to data • Poorly-trained staff destroy more data than any number of hackers • Good intentions won’t bring back deleted data • Train users fully; give good documentation
  • 33. Incompetent employees • Only give users enough access to data so they can do their job (hierarchical data access) – limits the damage they can do • Use good software that makes mistakes harder to make
  • 34. "Misplaced" data • Poor file handling procedures can lead to files being impossible to find without huge searches • May not be destroyed, but data is equally inaccessible. • Solution: properly planned and enforced file and folder naming scheme • Version control – to prevent overwriting recent documents with old data.
  • 35. ‘Natural’ disasters • E.g. fire, flood, earthquake, falling tree, runaway truck, power surge, riot, war, lightning • Uninterruptible Power Supply (UPS) can filter out dangerous power surges to protect hardware, and cope with blackouts • Disaster may not be preventable, but can be recovered from with a good data disaster recovery plan…
  • 36. Disaster Recovery Plan • Relies on backups. • Effective backups must be: – Regular (incremental daily, full backup weekly) – Tested (with sample data, not real data!) – Stored offsite • Key recovery info should also be stored offsite – Insurance company, policy number etc – Details of backup software and hardware to allow restore – etc
  • 37. Disaster Recovery Plan • Any DDRP must be tested to find weaknesses or omissions – Perform test restores of backed up data – Practice fire drills – Ensure that the emergency administrator password works – Test smoke alarms, burglar alarms – Ensure emergency contacts list is up to date – etc
  • 38. Technical Failure • Hardware failure (e.g. hard disk crash, file server failure) • Operating system failure • Software failure
  • 39. Hardware Failure • Typically: hard disk, power supplies (moving parts age quickly) • Also: circuit boards (solder joints dry out and break) • Solution: redundant equipment (e.g. two power supplies, NICs) • Solution: good environment – Air conditioned server room – UPS to prevent power surges
  • 40. Software Failure • OS crash or application failure can cause data loss if work in progress has not been saved recently • Not likely to damage any hardware • Can waste time and cause annoyance • Solution: save frequently!
  • 41. Consequences of ignoring safety measures • Loss of valuable data that can’t be replaced at all, or only with huge effort and cost • Competitors finding out your secrets • Damage to or loss of expensive equipment • Financial loss through misuse of credit cards or bank accounts
  • 42. Consequences • Unwitting participation in illegal actions such as spamming or DDOS attacks • Loss of reputation through negligently letting customer information go public • Penalties by the tax office for not having proper GST or tax records • Prosecution under the Privacy Act if sensitive information is not properly protected.
  • 43. Consequences • Loss of income when unable to do business due to system failure • Total failure of the organisation after catastrophic data loss • Organisational death.
  • 44. Remember • No system is 100% invulnerable • If someone is sufficiently determined to get in, they will • No one protection measure is perfect • A combination of simple measures is very powerful…
  • 45. Remember • Implement protection against the most likely risks: – Do good backups – Lock doors – Use strong passwords – Run antivirus software – Use a router and firewall – Train staff against phishing and opening attachments • Such simple measures will mean 99.99% protection
  • 46. Remember in U4O2 • Recommend sensible strategies that are appropriate to the organisation in the case study. • Don’t invent outlanding, unlikely risks that are not in the case study. • Forget the 24x7 armed guard protecting the fish & chip shop’s PC. • Forget the ceiling-mounted
  • 47. Criteria for evaluating the effectiveness of data security management strategies. Notes: RTQ (Read The Question) criteria, not methods evaluating, not testing effectiveness, not efficiency • How well the strategies protect data from being deliberately or accidentally stolen, damaged or lost. • How easily lost or damaged data can be restored.
  • 48. Criteria for evaluating the effectiveness of data security management strategies. • How easy the strategies are to carry out. • Accuracy of risk detection – e.g. number of virus infections or hacking attempts that were correctly detected and acted upon)
  • 49. Criteria for evaluating the effectiveness of data security management strategies. • Timeliness of reactions to threats – Did a defence strategy operate in time to prevent a detected threat – e.g. did a UPS kick in quickly enough to stop a power surge or loss of power? – E.g. did a firewall block a port sniffing before a hacker could do any harm?
  • 50. IT APPLICATIONS SLIDESHOWS By Mark Kelly mark@vceit.com vceit.com These slideshows may be freely used, modified or distributed by teachers and students anywhere on the planet (but not elsewhere). They may NOT be sold. They must NOT be redistributed if you modify them.