280 likes | 579 Vues
What is System Security?. Protection of assets from unauthorized accessprotection from unauthorized access both from within and externalSecurity is a process of reducing risk or the likelihood of harmSecurity is a weak link problem- total security is no better than the weakest link.It must, ther
E N D
1. BASIC SECURITY CONCEPTS What is security?
What are we protecting?
System security
Network security
Security awareness
The security process
Security procedures
Security in TCP/IP layers
2. What is System Security? Protection of assets from unauthorized access
protection from unauthorized access both from within and external
Security is a process of reducing risk or the likelihood of harm
Security is a weak link problem- total security is no better than the weakest link.
It must, therefore, be evaluated across the entire enterprise
Security is a series of trade-offs: the greater the level of security the worse the ease of use.
3. There are 10 fundamental aspects of security ( system security):
Awareness make every one understand the critical role security plays in their well-being
Access ability to connect to the system resources
Identification to be able to know the user
Authentication preventing unauthorized interception of information during transmission
Authorization allowing identifiable users access to the resources
Availability preventing unauthorized withholding of information and resources
Integrity preventing unauthorized modification of information
Accuracy an assurance of the integrity of the resources
Confidentiality disclosure of information
Accountability ensuring that if there is unauthorized access to information, the source can be easily found through an audit
4. To safeguard the value of resources ( security of resources) the following are fundamental:
Confidentially- make the resources sharable among only authorized users. Also to make the sender and receiver of the message authenticate each other and make sure that the content of the message is not altered either by accident or maliciously. In addition, proprietary resources like information need confidentiality
Accuracy/Message integrity and non-repudiation the state of information about the resource must be reliable and verifiable as correct as possible
Availability/Access Control resource must be available at all times when needed by a legitimate user.
Authentication both sender and receiver should be able to confirm identity of each other to confirm that the other party is who or what they claim to be.
5. Security phases:
Inspection identifying key security functions needed and the capabilities available to achieve the desired security level
Protection proactive risk reduction mechanism in place to prevent reduction in desired security level
Detection ( in action) to take measures to detect whether an asset has been damaged, how, and who has caused the damage.
Response ( post-action) to take measures that allow recovery of assets or recovery from damage, and minimize losses (unwanted publicity).
Reflection plans/processes that focus on security improvements.
6. What are we protecting? We are protecting system resources:
Business information
Equipment
Systems
Data (information)
Data and Information - the most important resource:
Data is a physical phenomena that represents certain aspects of our conceptualization of the world
When we process data we give it meaning and we call it information.
Data and information are:
Stored
Moved over communication channels
We focus on security of data and information:
At source ( source: server/client)
At destination (destination: server/client)
In the communication channel
The security of computer networks means the security of information on that network.
7. Ensure security in a network by: Access legal channels of getting resources
Identification to uniquely distinguish a user of a resource
Authentication to prove positively that the user is what he/she claims to be.
Authorization being able to determine and allow the user only those resources the user has ability to utilize.
8. Enhance security by: Accountability ability to associate activities with the actors.
Awareness create/cultivate a level of understanding of security issues
Administration ability to manage the security system.
9. Security awareness Security is a continuous process of making valuable resources secure.
First act in securing system resources is awareness
Process of making people understand the implications of security in their lives
All people in the enterprise must understand the importance of security
All people must understand the following:
Appropriate use of resources all people must know why security of resources matter.
Relevancy of security
Individuals role
Responsibility
Repercussions
10. Awareness programs must be:
Continuous because of new people and program updates.
Comprehensive to cover all aspects of the enterprise that involve security
Coherent to be well understood no mistakes must be made
Cost-effect - to encourage people to be responsive/responsible this pays handsomely in the long run.
Awareness plans must be designed to include:
Most effective delivery method
Effective message content
Awareness implementation
Awards/rewards
Broad-based
Focused
individual
11. Causes of system security lapses - Hardware many security problems originate from hardware failures and poor designs
Software lots of security problems originate from poor software designs and testing
Human/user humans are very unpredictable and malicious
* Resources ( data and information) because the resources within the computer system themselves may contain loopholes through which, if found, intruders enter the systems.
Having established the security framework and need for network security (more next week) let us look at the current security procedures
12. Security procedures:
Good and effective security is a result of a good security policy
A policy may have one or more of the following procedures:
For servers and Clients:
Intrusion Detection Systems (IDS)
Firewalls
For the communication channel:
Encryption
Authentication
13. Firewalls To limit access to the local network through the filtering of signatures:
Filtering policy
Deny everything (deny-everything-not-specifically allowed)- deny everything then later add those things that are allowed by exception (recommended)
Allow everything (allow-everything-not-specifically- denied) allows everything then denies services considered unacceptable.
Signatures are frequently updated
14. Network-based IDS Network-based IDS is a real-time monitoring system of the network based on external traffic signatures (mostly signatures of known exploits) as they enter a secure private network
Unlike firewalls, IDS sensors capture, store, and report on signatures without altering them.
It also monitors internal traffic as it tries to move outside the private network.
Parameters used to monitor traffic signatures in and out of the private network are base on either TCP or UDP structures.
IDS sensors are either based on software or hardware.