+ All Categories
Home > Documents > Information Security A Practical Introduction

Information Security A Practical Introduction

Date post: 27-Jan-2016
Category:
Upload: kira
View: 31 times
Download: 2 times
Share this document with a friend
Description:
Creative Commons License: You are free to share and remix but you must provide attribution and you must share alike. Information Security A Practical Introduction. What does “Security” mean?. ?. What is Information Security About?. InfoSec is about… Viruses. InfoSec is about… Hackers. - PowerPoint PPT Presentation
Popular Tags:
35
Michael McDonnell GIAC Certified Intrusion Analyst [email protected] Creative Commons License: You are free to share and remix but you must provide attribution and you must share alike. Information Information Security Security A Practical Introduction A Practical Introduction
Transcript
Page 1: Information Security A Practical Introduction

Michael McDonnellGIAC Certified Intrusion Analyst

[email protected]

Creative Commons License: You are free to share and remix but you must provide attribution and you must share alike.

Information SecurityInformation SecurityA Practical IntroductionA Practical Introduction

Page 2: Information Security A Practical Introduction

What does “Security” mean?

?

Page 3: Information Security A Practical Introduction

What is Information Security About?

Page 4: Information Security A Practical Introduction

InfoSec is about… VirusesViruses

Page 5: Information Security A Practical Introduction

InfoSec is about… HackersHackers

Page 6: Information Security A Practical Introduction

InfoSec is about… VandalismVandalism

Page 7: Information Security A Practical Introduction

InfoSec is about… BackupsBackups

Page 8: Information Security A Practical Introduction

InfoSec is about… TheftTheft

Page 9: Information Security A Practical Introduction

InfoSec is about… Computer “Uptime”

Page 10: Information Security A Practical Introduction

InfoSec is about… PhonesPhones

Page 11: Information Security A Practical Introduction

InfoSec is… about InformationInformation

Page 12: Information Security A Practical Introduction

Information Security as an OutcomeOutcome

"Our systems areare secure from hackers“

"We havehave blocked 17,342 viruses to date“

“Our systems are all online“

“Insiders cannotcannot steal our information”

“We have backups”

““We are Secure”We are Secure”

Page 13: Information Security A Practical Introduction

Information Security as a ProcessProcess

“We want to improveimprove security“

"We need to protect against moremore threats"

"We want to reducereduce risk"

"We want to increaseincrease customer confidence"

"We want to decreasedecrease the number of compromises"

““We want to be We want to be more Secure”more Secure”

Page 14: Information Security A Practical Introduction

InfoSec is… Risk ManagementRisk Management

IdentifyA

nalyzeM

easu

re

PlanImplement

Page 15: Information Security A Practical Introduction

What is at Risk?

ConfidentialityConfidentiality

IntegrityIntegrity

AvailabilityAvailability

Page 16: Information Security A Practical Introduction

Defence in DepthDefence in Depth lowers Risk

Firewalls do not make you secureAnti-virusAnti-virus does not make you secure

PoliciesPolicies do not make you secureVPNsVPNs do not make you secure

Guards do not make you securePasswordsPasswords do not make you secure

 

Together they all make you MOREMORE

secure

 

Page 17: Information Security A Practical Introduction

Threat: Denial of Service

Page 18: Information Security A Practical Introduction

Counter: Firewalls and Switches

Page 19: Information Security A Practical Introduction

An unpatched server was compromised and used to distributed 20 GB of videos with French language titles. The problem was discovered when the server was blocked for excessive bandwidthexcessive bandwidth usage.

??

Threat: Unintentional DoS

Page 20: Information Security A Practical Introduction

French Puppet Videos!

The server was distributing 20 GB of French Puppet VideosFrench Puppet Videos. The cleanup time was 7 hours. If they had just asked we would have probably found someone to host the videos for them!

Page 21: Information Security A Practical Introduction

Counter: Change ManagementChange Management

Page 22: Information Security A Practical Introduction

Counter: Monitoring

Page 23: Information Security A Practical Introduction

Threat: SQL Injection Attack

Page 24: Information Security A Practical Introduction

Counter: Vulnerability Scanning

Page 25: Information Security A Practical Introduction

Counter: Developer Training

Page 26: Information Security A Practical Introduction

Counter: Web Application Firewall

Page 27: Information Security A Practical Introduction

Threat: The Man-in-the-Middle

The Pineapple

1. Pretends to be YOURYOUR home wifi network.

2.2. RecordsRecords what you do on the Internet.

Page 28: Information Security A Practical Introduction

Counter: 2 Factor Authentication

YUBIKEY SecurID

Google 2FA

Page 29: Information Security A Practical Introduction

Threat: Insiders

Page 30: Information Security A Practical Introduction

Counter: DLP and DPI

Deep Packet Inspection (DPI): Firewalls inspect every packet on the network and rebuild the entire message.

Data Loss Prevention (DLP): Uses DPI and pattern matching to look for suspicious content being sent FROM your network.

Page 31: Information Security A Practical Introduction

Threat: Malvertisements

Page 32: Information Security A Practical Introduction

Why D.I.D? It never rainsrains… it pourspours

1. The OS Vendor stopped providing patches2. The server was hacked3. A hard disk failed4. A cooling fan died & it crashes every 2hr5. The software vendor wanted more money6. Hardware support had not been paid for

Page 33: Information Security A Practical Introduction

Final Threat: The A.P.T.

Advanced Persistent Threat

Page 34: Information Security A Practical Introduction

InfoSec is… Everyone’s Responsibility

ConfidentialityConfidentiality

IntegrityIntegrity

AvailabilityAvailability

Page 35: Information Security A Practical Introduction

Questions?

Email:[email protected]

Slides:http://winterstorm.ca/download/


Recommended