1 / 28

Information Assurance and Computer Security

Information Assurance and Computer Security. OVERVIEW. Threat defined Categories of threats Specific types of threats Historical turncoats Your responsibilities. What is a threat?.

ros
Télécharger la présentation

Information Assurance and Computer Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Information AssuranceandComputer Security

  2. OVERVIEW • Threat defined • Categories of threats • Specific types of threats • Historical turncoats • Your responsibilities

  3. What is a threat? • Any circumstance or event with the potential to cause harm to an informationsystem in the form of destruction, disclosure, adverse modification of data, and/or denial of service • Current and perceived capability, intention, or attack directed to cause denial of service, corruption, compromise, or fraud, waste, and abuse to an information system

  4. Categories of Threats • Technical - hardware, software, or design deficiency … often vulnerable right out of the box • Administrative - inadequate or incorrect implementation of existing security features - not a design flaw but rather poor policy, process or procedure

  5. What are the types of threats? • Unintentional Threats - spilled food or liquid - downloaded game or software - disabled anti-virus software - unattended computer with no locked keyboards or screensavers - accidental deletion or modification of files

  6. Types of Threats…cont’d • Intentional Threats - - Social engineering - Elicitation - Computer network attack - The insider threat Type in your Social Security Number for a free credit report Please enter your password to validate your account

  7. Types of Threats...cont’d • Intentional Threats -Social engineering - Elicitation - Computer network attack - The insider threat

  8. Types of Threats...cont’d • Intentional Threats - Social engineering - Elicitation - Computer network attack How are they attacked? - The insider threat

  9. Intentional Threats …cont’d - Computer network attacks The Internet…perhaps our largest daily threat --Cookies --Mobile code, malicious code & spy-ware --Use of home internet service provider --OPSEC…or lack of it --Distributed denial of service --Hoaxes --Spam

  10. Types of Threats...cont’d • Intentional Threats - Social engineering - Elicitation - Computer network attack - The insider threat

  11. Would insiders really steal information?

  12. Famous Turncoats • Benedict Arnold -Appointed by George Washington to a position in the Continental Congress…a trusted position. - He was caught trying to smuggle classified documents to the British in 1780.

  13. Famous Turncoats • The Rosenburgs (Ethel and Julius) Controversial case; convicted of spying for the Soviet Union • Passed secret of the “A” bomb to the Soviets (from the Manhattan Project) • Judge Irving Kaufman found them guilty of espionage and said “ they contributed to the communist aggression and 50,000 deaths of the Korean War.”

  14. Famous Turncoats • Both were executed in 1953 for Conspiracy to Commit Espionage. • In 1995 NSA released de-crypted evidence of their involvement. • In his memoirs posthumously published in 1990 Nitkita Khrushchev praised both of them for their “very significant help in the production of the atomic bomb.”

  15. Famous Turncoats • Aldrich Ames…The Chief of Counterintelligence in Eastern Europe and the Soviet Union • CIA employee for 31 years • Sold the names of all his co-worker spies to the Soviet Union for $50,000 • “The most damaging spy case in the history of this country”…….NSI, 1995… NSI . org

  16. Famous Turncoats • Ultimately betrayed more than 100 operations and received $3 million. • His betrayal led to the execution of 10 KGB (Soviet) double agents and 11 US agents. CIA IG report 1994

  17. Famous Turncoats A little close to home……. • Brian P. Regan…worked for the super-secret National Reconnaissance Office; they design and operate spy satellites…Top Secret information • Arrested Aug 23, 2002, with classified information in his possession • Stole, copied, and buried over 20,000 pages of documents classified as Top Secret or higher…

  18. Brian Regan • Buried documents in 19 locations including state parks…detailed information on satellites, early warning systems, missile site coordinates, and WMD • Wrote letter to Saddam Hussein…offered to sell Top Secret information for $13 million …also had identical letters on his computer to China, Iran, and Libya • Regan was bitter over “the small pension received for years of service”…..who was the service with?

  19. A little close to home……………… • Brian P. Regan • Master Sergeant, USAF, Retired • 38 year-old, father of four, deeply in debt and in 2003 sentenced to life in prison…lost his “small pension”

  20. What can I do to help?What are my Responsibilities? • Fight the insider threat - protect your access to information (physical access)…keys/doors, personnel rosters ...physical security -protect your electronic access…don’t share passwords, access cards, codes, etc. -report shoulder surfers or suspicious activity

  21. What are my Responsibilities? • Use your virus software • Run on start-up and weekly minimum • Use it on your home computer too • Scan all removable media (disks, DVDs,CDs) before each use • Save and scan attachments (especially all high risk)

  22. What Are My Responsibilities? • Don’t load software or programs on government computers without permission. -including freeware • Don’t talk about official business in open chat rooms or forums.

  23. What are my Responsibilities? • Don’t post your email address in chat rooms, forums, or message boards. • Report violations or suspicious activity. -pornography -loading personal software -revealing sensitive information -failure to take security measures

  24. SUMMARY • Threat defined • Categories of threats • Specific types of threats • Historical turncoats • Your responsibilities

  25. “ The truth is that there’s an enemy that still lurks out there. And we must continue to work together to protect our country…the most solemn duty of government is to protect American people.”George W. Bush, January 23, 2004

More Related