SlideShare ist ein Scribd-Unternehmen logo
1 von 50
About the Presentations
• The presentations cover the objectives found in the
opening of each chapter.
• All chapter objectives are listed in the beginning of
each presentation.
• You may customize the presentations to fit your
class needs.
• Some figures from the chapters are included. A
complete set of images from the book can be found
on the Instructor Resources disc.
1CompTIA Security+ Guide to Network
Security Fundamentals, Fifth Edition
CompTIA Security+ Guide to
Network Security Fundamentals,
Fifth Edition
Chapter 1
Introduction to Security
© Cengage Learning 2015
Objectives
• Describe the challenges of securing information
• Define information security and explain why it is
important
• Identify the types of attackers that are common
today
• List the basic steps of an attack
• Describe the five basic principles of defense
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
3
© Cengage Learning 2015
Challenges of Securing Information
• Securing information
– No simple solution
– Many different types of attacks
– Defending against attacks is often difficult
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
4
© Cengage Learning 2015
Today’s Security Attacks
• Examples of recent attacks
– Attack on a credit card processing company that
handles prepaid debit cards
– Taking control of wireless cameras
– ATM machine attacks
– Taking over Twitter accounts
– Serial server attacks
– Attackers using online sites such as Craigslist and
eBay to lure victims to download malware
– Penetration of Apple’s very own network
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
5
© Cengage Learning 2015
Today’s Security Attacks
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
6
© Cengage Learning 2015
Difficulties in Defending Against
Attacks
• Universally connected devices
• Increased speed of attacks
• Greater sophistication of attacks
• Availability and simplicity of attack tools
• Faster detection of vulnerabilities
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
7
© Cengage Learning 2015
Difficulties in Defending Against
Attacks
• Delays in security updating
• Weak security update distribution
• Distributed attacks
• Introduction of BYOD
• User confusion
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
8
© Cengage Learning 2015
Difficulties in Defending Against
Attacks
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
9
© Cengage Learning 2015
What Is Information Security?
• Before defense is possible, one must understand:
– Exactly what security is
– How security relates to information security
– The terminology that relates to information security
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
10
© Cengage Learning 2015
Understanding Security
• Security is:
– The goal to be free from danger
– The process that achieves that freedom
• Harm/danger may come from one of two sources:
– From a direct action that is intended to inflict
damage
– From an indirect and unintentional action
• As security is increased, convenience is often
decreased
– The more secure something is, the less convenient it
may become to use
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
11
© Cengage Learning 2015
Understanding Security
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
12
© Cengage Learning 2015
Defining Information Security
• Information security - the tasks of securing
information that is in a digital format:
– Manipulated by a microprocessor
– Stored on a storage device
– Transmitted over a network
• Information security goal - to ensure that protective
measures are properly implemented to ward off
attacks and prevent the total collapse of the system
when a successful attack occurs
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
13
© Cengage Learning 2015
Defining Information Security
• Three types of information protection: often called
CIA
– Confidentiality
• Only approved individuals may access information
– Integrity
• Information is correct and unaltered
– Availability
• Information is accessible to authorized users
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
14
© Cengage Learning 2015
Defining Information Security
• Protections implemented to secure information
– Authentication
• Ensures the individual is who they claim to be
– Authorization
• Provides permission or approval to specific technology
resources
– Accounting
• Provides tracking of events
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
15
© Cengage Learning 2015
Defining Information Security
• Information security is achieved through a process
that is a combination of three entities:
– Information and the hardware
– Software
– Communications
• These entities are protected in three layers:
– Products
– People
– Policies and procedures
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
16
© Cengage Learning 2015
Defining Information Security
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
17
© Cengage Learning 2015CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
Defining Information Security
18
© Cengage Learning 2015
Information Security Terminology
• Asset
– Item that has value
• Threat
– Type of action that has the potential to cause harm
• Threat agent
– A person or element with power to carry out a threat
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
19
© Cengage Learning 2015
Information Security Terminology
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
20
© Cengage Learning 2015
Information Security Terminology
• Vulnerability
– Flaw or weakness that allows a threat agent to
bypass security
• Threat vector
– The means by which an attack can occur
• Threat likelihood
– Likelihood that threat agent will exploit vulnerability
• Risk
– A situation that involves exposure to some type of
danger
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
21
© Cengage Learning 2015
Information Security Terminology
• Options to deal with risk:
– Risk avoidance - involves identifying the risk but not
engaging in the activity
– Acceptance - risk is acknowledged but no steps are
taken to address it
– Risk mitigation - the attempt to address the risks by
making risk less serious
– Deterrence - understanding the attacker and then
informing him of the consequences of his actions
– Transference - transferring the risk to a third party
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
22
© Cengage Learning 2015
Information Security Terminology
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
23
© Cengage Learning 2015
Understanding the Importance of
Information Security
• Information security can be helpful in:
– Preventing data theft
– Thwarting identity theft
– Avoiding the legal consequences of not securing
information
– Maintaining productivity
– Foiling cyberterrorism
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
24
© Cengage Learning 2015
Preventing Data Theft
• Preventing data from being stolen is often the
primary objective of an organization’s information
security
• Business data theft involves stealing proprietary
business information
• Personal data theft involves stealing credit card
numbers
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
25
© Cengage Learning 2015
Thwarting Identity Theft
• Identity theft
– Stealing another person’s personal information
• Usually using it for financial gain
– Example:
• Steal person’s SSN
• Create new credit card account to charge purchases
and leave them unpaid
• File fraudulent tax returns
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
26
© Cengage Learning 2015
Avoiding Legal Consequences
• Laws protecting electronic data privacy:
– The Health Insurance Portability and Accountability
Act of 1996 (HIPAA)
– The Sarbanes-Oxley Act of 2002 (Sarbox)
– The Gramm-Leach-Bliley Act (GLBA)
– Payment Card Industry Data Security Standard (PCI
DSS)
– California’s Database Security Breach Notification
Act (2003)
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
27
© Cengage Learning 2015
Maintaining Productivity
• Post-attack clean up diverts resources away from
normal activities
– Time, money, and other resources
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
28
© Cengage Learning 2015
Foiling Cyberterrorism
• Cyberterrorism
– Any premeditated, politically motivated attack
against information, computer systems, computer
programs, and data
• Designed to:
– Cause panic
– Provoke violence
– Result in financial catastrophe
• May be directed at targets such as the banking
industry, power plants, air traffic control centers,
and water systems
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
29
© Cengage Learning 2015
Who Are the Attackers?
• Hacker - person who uses computer skills to attack
computers
• Black hat hackers
– Violate computer security for personal gain and the
goal is to inflict malicious damage
• White hat hackers
– Goal to expose security flaws, not to steal or corrupt
data
• Gray hat hackers
– Goal is to break into a system without owner’s
permission, but not for their own advantage
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
30
© Cengage Learning 2015
Who Are the Attackers?
• Categories of attackers
– Cybercriminals
– Script kiddies
– Brokers
– Insiders
– Cyberterrorists
– Hactivists
– State-sponsored attackers
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
31
© Cengage Learning 2015
Cybercriminals
• A network of attackers, identity thieves, spammers,
financial fraudsters
– More highly motivated
– Willing to take more risk
– Well-funded
– More tenacious
• The goal of a cybercriminal is financial gain
• Cybercrime - targeted attacks against financial
networks and the theft of personal information
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
32
© Cengage Learning 2015
Cybercriminals
• Financial cybercrime is divided into two categories:
– Individuals and businesses
• Use stolen data, credit card numbers, online financial
account information, or Social Security numbers to
profit from victims
– Businesses and governments
• Attempt to steal research on a new product so they
can sell it to an unscrupulous foreign supplier
• Advanced Persistent Threat (APT) - multiyear
intrusion campaign that targets highly sensitive
economic, proprietary, or national security
information
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
33
© Cengage Learning 2015
Script Kiddies
• Script kiddies - individuals who want to attack
computers yet they lack the knowledge of
computers and network needed to do so
• They download automated hacking software
(scripts) from websites
• Over 40 percent of attacks require low or no skills
• Exploit kits - automated attack package that can
be used without an advanced knowledge of
computers
– Script kiddies either rent or purchase them
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
34
© Cengage Learning 2015
Brokers
• Brokers - attackers who sell knowledge of a
vulnerability to other attackers or governments
• Often hired by the vendor to uncover vulnerabilities
– Instead they do not report it to the vendor but sell the
information about the vulnerabilities to the highest
bidder
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
35
© Cengage Learning 2015
Insiders
• Employees, contractors, and business partners
• Over 48 percent of breaches attributed to insiders
• Examples of insider attacks:
– Health care worker may publicize celebrities’ health
records
• Disgruntled over upcoming job termination
– Stock trader might conceal losses through fake
transactions
– Employees may be bribed or coerced into stealing
data before moving to a new job
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
36
© Cengage Learning 2015
Cyberterrorists
• Cyberterrorists - an attacker whose motivation
may be ideological or for the sake of principles or
beliefs
– Almost impossible to predict when or where the
attack may occur
• Targets may include:
– A small group of computers or networks that can
affect the largest number of users
• Example:
– Computers that control the electrical power grid of a
state or region
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
37
© Cengage Learning 2015
Hactivists
• Hactivists - attackers who attack for ideological
reasons that are generally not as well-defined as a
cyberterrorist’s motivation
• Examples of hactivist attacks:
– Breaking into a website and changing the contents
on the site to make a political statement
– Disabling a website belonging to a bank because the
bank stopped accepting payments that were
deposited into accounts belonging to the hactivists
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
38
© Cengage Learning 2015
State-Sponsored Attackers
• State-sponsored attacker - an attacker
commissioned by the governments to attack
enemies’ information systems
– May target foreign governments or even citizens of
the government who are considered hostile or
threatening
• Examples of attacks:
– Malware targeting government or military computers
– Citizens having their email messages read without
their knowledge
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
39
© Cengage Learning 2015
Attacks and Defenses
• A wide variety of attacks can be launched
– The same basic steps are used in most attacks
• To protect computers against attacks follow five
fundamental security principles
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
40
© Cengage Learning 2015
Steps of an Attack
• Cyber Kill Chain outlines the steps of an attack:
– 1. Reconnaissance - probe for information about the
system: type of hardware or software used
– 2. Weaponization - attacker creates an exploit and
packages it into a deliverable payload
– 3. Delivery - weapon is transmitted to the target
– 4. Exploitation - after weapon is delivered, the
exploitation stage triggers the intruder’s exploit
– 5. Installation - the weapon is installed to either
attack the computer or install a remote “backdoor”
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
41
© Cengage Learning 2015
Steps of an Attack
• Cyber Kill Chain outlines the steps of an attack
(cont’d):
– 6. Command and Control - the comprised system
connects back to the attacker so that the system can
be remotely controlled by the attacker
– 7. Action on Objectives - now the attackers can start
to take actions to achieve their original objectives
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
42
© Cengage Learning 2015CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
Defenses Against Attacks
• Five fundamental security principles for defenses:
– Layering
– Limiting
– Diversity
– Obscurity
– Simplicity
43
© Cengage Learning 2015
Layering
• Information security must be created in layers
– A single defense mechanism may be easy to
circumvent
– Making it unlikely that an attacker can break through
all defense layers
• Layered security approach
– Can be useful in resisting a variety of attacks
– Provides the most comprehensive protection
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
44
© Cengage Learning 2015
Limiting
• Limiting access to information:
– Reduces the threat against it
• Only those who must use data should be granted
access
– Should be limited to only what they need to do their
job
• Methods of limiting access
– Technology-based - such as file permissions
– Procedural - such as prohibiting document removal
from premises
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
45
© Cengage Learning 2015
Diversity
• Closely related to layering
– Layers must be different (diverse)
• If attackers penetrate one layer:
– Same techniques will be unsuccessful in breaking
through other layers
• Breaching one security layer does not compromise
the whole system
• Example of diversity
– Using security products from different manufacturers
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
46
© Cengage Learning 2015
Obscurity
• Obscuring inside details to outsiders
• Example: not revealing details
– Type of computer
– Operating system version
– Brand of software used
• Difficult for attacker to devise attack if system
details are unknown
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
47
© Cengage Learning 2015
Simplicity
• Nature of information security is complex
• Complex security systems:
– Can be difficult to understand and troubleshoot
– Are often compromised for ease of use by trusted
users
• A secure system should be simple from the inside
– But complex from the outside
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
48
© Cengage Learning 2015
Summary
• Information security attacks have grown
exponentially in recent years
• It is difficult to defend against today’s attacks
• Information security protects information’s integrity,
confidentiality, and availability:
– On devices that store, manipulate, and transmit
information
– Using products, people, and procedures
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
49
© Cengage Learning 2015
Summary
• Main goals of information security
– Prevent data theft
– Thwart identity theft
– Avoid legal consequences of not securing
information
– Maintain productivity
– Foil cyberterrorism
• Different types of people with different motivations
conduct computer attacks
• An attack has seven general steps known as the
Cyber Kill Chain
CompTIA Security+ Guide to Network Security Fundamentals,
Fifth Edition
50

Weitere ähnliche Inhalte

Was ist angesagt?

Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust ModelYash
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)Ahmed Banafa
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​AlgoSec
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...Edureka!
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]David Sweigert
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in DepthDilum Bandara
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and FirewallShafeeqaFarsana
 
Chapter 3 Presentation
Chapter 3 PresentationChapter 3 Presentation
Chapter 3 PresentationAmy McMullin
 
Cyber Threat Simulation Training
Cyber Threat Simulation TrainingCyber Threat Simulation Training
Cyber Threat Simulation TrainingBryan Len
 
Cybersecurity Framework - Introduction
Cybersecurity Framework - IntroductionCybersecurity Framework - Introduction
Cybersecurity Framework - IntroductionMuhammad Akbar Yasin
 
Threat Modeling Everything
Threat Modeling EverythingThreat Modeling Everything
Threat Modeling EverythingAnne Oikarinen
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsLearningwithRayYT
 
Chapter 2 Malware and Social Engineering Attacks
Chapter 2 Malware and Social Engineering AttacksChapter 2 Malware and Social Engineering Attacks
Chapter 2 Malware and Social Engineering AttacksDr. Ahmed Al Zaidy
 
Chapter 11 Authentication and Account Management
Chapter 11 Authentication and Account ManagementChapter 11 Authentication and Account Management
Chapter 11 Authentication and Account ManagementDr. Ahmed Al Zaidy
 
Cyber Security roadmap.pptx
Cyber Security roadmap.pptxCyber Security roadmap.pptx
Cyber Security roadmap.pptxSandeepK707540
 
Network security
Network securityNetwork security
Network securityEstiak Khan
 
Secure by Design - Security Design Principles for the Rest of Us
Secure by Design - Security Design Principles for the Rest of UsSecure by Design - Security Design Principles for the Rest of Us
Secure by Design - Security Design Principles for the Rest of UsEoin Woods
 

Was ist angesagt? (20)

Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust Model
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
 
Security and Linux Security
Security and Linux SecuritySecurity and Linux Security
Security and Linux Security
 
Chapter 3 Presentation
Chapter 3 PresentationChapter 3 Presentation
Chapter 3 Presentation
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
Cyber Threat Simulation Training
Cyber Threat Simulation TrainingCyber Threat Simulation Training
Cyber Threat Simulation Training
 
Cybersecurity Framework - Introduction
Cybersecurity Framework - IntroductionCybersecurity Framework - Introduction
Cybersecurity Framework - Introduction
 
Threat Modeling Everything
Threat Modeling EverythingThreat Modeling Everything
Threat Modeling Everything
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack Vectors
 
Chapter 2 Malware and Social Engineering Attacks
Chapter 2 Malware and Social Engineering AttacksChapter 2 Malware and Social Engineering Attacks
Chapter 2 Malware and Social Engineering Attacks
 
Chapter 11 Authentication and Account Management
Chapter 11 Authentication and Account ManagementChapter 11 Authentication and Account Management
Chapter 11 Authentication and Account Management
 
Cyber Security roadmap.pptx
Cyber Security roadmap.pptxCyber Security roadmap.pptx
Cyber Security roadmap.pptx
 
Network security
Network securityNetwork security
Network security
 
Cyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in DepthCyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in Depth
 
Secure by Design - Security Design Principles for the Rest of Us
Secure by Design - Security Design Principles for the Rest of UsSecure by Design - Security Design Principles for the Rest of Us
Secure by Design - Security Design Principles for the Rest of Us
 

Andere mochten auch

Chapter 9 PowerPoint
Chapter 9 PowerPointChapter 9 PowerPoint
Chapter 9 PowerPointAmy McMullin
 
Chapter 11 Presentation
Chapter 11 PresentationChapter 11 Presentation
Chapter 11 PresentationAmy McMullin
 
A+ Chapter 3 Review
A+ Chapter 3 ReviewA+ Chapter 3 Review
A+ Chapter 3 ReviewAmy McMullin
 
Chapter 12 Presentation
Chapter 12 PresentationChapter 12 Presentation
Chapter 12 PresentationAmy McMullin
 
Chapter 8 Presentaion
Chapter 8 PresentaionChapter 8 Presentaion
Chapter 8 PresentaionAmy McMullin
 
9781305094352 ppt ch08
9781305094352 ppt ch089781305094352 ppt ch08
9781305094352 ppt ch08Amy McMullin
 
What's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing ConferenceWhat's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing ConferenceCengage Learning
 
A+ Chapter 4 Review
A+ Chapter 4 ReviewA+ Chapter 4 Review
A+ Chapter 4 ReviewAmy McMullin
 
A+ Chapter 5 Review
A+ Chapter 5 ReviewA+ Chapter 5 Review
A+ Chapter 5 ReviewAmy McMullin
 
How to hack the web
How to hack the webHow to hack the web
How to hack the webAmy McMullin
 
CompTIA Security+ Guide
CompTIA Security+ GuideCompTIA Security+ Guide
CompTIA Security+ GuideSmithjulia33
 
CompTIA Security+ ce certificate
CompTIA Security+ ce certificateCompTIA Security+ ce certificate
CompTIA Security+ ce certificateLuigi Cristiani
 
Ceh v7 module 01 introduction to ethical hacking
Ceh v7 module 01 introduction to ethical hackingCeh v7 module 01 introduction to ethical hacking
Ceh v7 module 01 introduction to ethical hackingsabulite
 

Andere mochten auch (19)

Chapter 9 PowerPoint
Chapter 9 PowerPointChapter 9 PowerPoint
Chapter 9 PowerPoint
 
Chapter 11 Presentation
Chapter 11 PresentationChapter 11 Presentation
Chapter 11 Presentation
 
A+ Chapter 3 Review
A+ Chapter 3 ReviewA+ Chapter 3 Review
A+ Chapter 3 Review
 
Chapter 12 Presentation
Chapter 12 PresentationChapter 12 Presentation
Chapter 12 Presentation
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Chapter 8 Presentaion
Chapter 8 PresentaionChapter 8 Presentaion
Chapter 8 Presentaion
 
Ch01 Introduction to Security
Ch01 Introduction to SecurityCh01 Introduction to Security
Ch01 Introduction to Security
 
9781305094352 ppt ch08
9781305094352 ppt ch089781305094352 ppt ch08
9781305094352 ppt ch08
 
What's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing ConferenceWhat's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing Conference
 
hacker culture
hacker culturehacker culture
hacker culture
 
A+ Chapter 4 Review
A+ Chapter 4 ReviewA+ Chapter 4 Review
A+ Chapter 4 Review
 
A+ Chapter 5 Review
A+ Chapter 5 ReviewA+ Chapter 5 Review
A+ Chapter 5 Review
 
Intro to Security
Intro to SecurityIntro to Security
Intro to Security
 
How to hack the web
How to hack the webHow to hack the web
How to hack the web
 
Ch06 Wireless Network Security
Ch06 Wireless Network SecurityCh06 Wireless Network Security
Ch06 Wireless Network Security
 
CompTIA Security+ Guide
CompTIA Security+ GuideCompTIA Security+ Guide
CompTIA Security+ Guide
 
Ch01
Ch01Ch01
Ch01
 
CompTIA Security+ ce certificate
CompTIA Security+ ce certificateCompTIA Security+ ce certificate
CompTIA Security+ ce certificate
 
Ceh v7 module 01 introduction to ethical hacking
Ceh v7 module 01 introduction to ethical hackingCeh v7 module 01 introduction to ethical hacking
Ceh v7 module 01 introduction to ethical hacking
 

Ähnlich wie CompTIA Security+ Chapter Presentations and Objectives

1_Introduction to security.pptx
1_Introduction to security.pptx1_Introduction to security.pptx
1_Introduction to security.pptxdiaa46
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDonald Tabone
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information SecurityAhmed Sayed-
 
India Start-ups IT Security & IT Act 2008
India Start-ups IT Security & IT Act 2008India Start-ups IT Security & IT Act 2008
India Start-ups IT Security & IT Act 2008ValueMentor Consulting
 
Cybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial ServicesCybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial ServicesJohn Rapa
 
DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015T. J. Saotome
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-levelDonald Tabone
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should KnowIBM Security
 
Insecurity Through Technology
Insecurity Through TechnologyInsecurity Through Technology
Insecurity Through Technologydfroud
 
Class4 Security
Class4 SecurityClass4 Security
Class4 SecurityRMS
 
NZISF Talk: Six essential security services
NZISF Talk: Six essential security servicesNZISF Talk: Six essential security services
NZISF Talk: Six essential security servicesHinne Hettema
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsIBM Security
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Peter Wood
 

Ähnlich wie CompTIA Security+ Chapter Presentations and Objectives (20)

1_Introduction to security.pptx
1_Introduction to security.pptx1_Introduction to security.pptx
1_Introduction to security.pptx
 
ISM Chapter 1.ppt
ISM Chapter 1.pptISM Chapter 1.ppt
ISM Chapter 1.ppt
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
India Start-ups IT Security & IT Act 2008
India Start-ups IT Security & IT Act 2008India Start-ups IT Security & IT Act 2008
India Start-ups IT Security & IT Act 2008
 
Infosec lecture-final
Infosec lecture-finalInfosec lecture-final
Infosec lecture-final
 
Cybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial ServicesCybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial Services
 
DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-level
 
Career in cyber security
Career in  cyber securityCareer in  cyber security
Career in cyber security
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
 
Insecurity Through Technology
Insecurity Through TechnologyInsecurity Through Technology
Insecurity Through Technology
 
Chap01
Chap01Chap01
Chap01
 
Class4 Security
Class4 SecurityClass4 Security
Class4 Security
 
Topic11
Topic11Topic11
Topic11
 
NZISF Talk: Six essential security services
NZISF Talk: Six essential security servicesNZISF Talk: Six essential security services
NZISF Talk: Six essential security services
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
Information Security Concepts.pdf
Information Security Concepts.pdfInformation Security Concepts.pdf
Information Security Concepts.pdf
 
Emerging Trends in Cybersecurity by Amar Prusty
Emerging Trends in Cybersecurity by Amar PrustyEmerging Trends in Cybersecurity by Amar Prusty
Emerging Trends in Cybersecurity by Amar Prusty
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)
 

Kürzlich hochgeladen

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 

Kürzlich hochgeladen (20)

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 

CompTIA Security+ Chapter Presentations and Objectives

  • 1. About the Presentations • The presentations cover the objectives found in the opening of each chapter. • All chapter objectives are listed in the beginning of each presentation. • You may customize the presentations to fit your class needs. • Some figures from the chapters are included. A complete set of images from the book can be found on the Instructor Resources disc. 1CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition
  • 2. CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition Chapter 1 Introduction to Security
  • 3. © Cengage Learning 2015 Objectives • Describe the challenges of securing information • Define information security and explain why it is important • Identify the types of attackers that are common today • List the basic steps of an attack • Describe the five basic principles of defense CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 3
  • 4. © Cengage Learning 2015 Challenges of Securing Information • Securing information – No simple solution – Many different types of attacks – Defending against attacks is often difficult CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 4
  • 5. © Cengage Learning 2015 Today’s Security Attacks • Examples of recent attacks – Attack on a credit card processing company that handles prepaid debit cards – Taking control of wireless cameras – ATM machine attacks – Taking over Twitter accounts – Serial server attacks – Attackers using online sites such as Craigslist and eBay to lure victims to download malware – Penetration of Apple’s very own network CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 5
  • 6. © Cengage Learning 2015 Today’s Security Attacks CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 6
  • 7. © Cengage Learning 2015 Difficulties in Defending Against Attacks • Universally connected devices • Increased speed of attacks • Greater sophistication of attacks • Availability and simplicity of attack tools • Faster detection of vulnerabilities CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 7
  • 8. © Cengage Learning 2015 Difficulties in Defending Against Attacks • Delays in security updating • Weak security update distribution • Distributed attacks • Introduction of BYOD • User confusion CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 8
  • 9. © Cengage Learning 2015 Difficulties in Defending Against Attacks CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 9
  • 10. © Cengage Learning 2015 What Is Information Security? • Before defense is possible, one must understand: – Exactly what security is – How security relates to information security – The terminology that relates to information security CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 10
  • 11. © Cengage Learning 2015 Understanding Security • Security is: – The goal to be free from danger – The process that achieves that freedom • Harm/danger may come from one of two sources: – From a direct action that is intended to inflict damage – From an indirect and unintentional action • As security is increased, convenience is often decreased – The more secure something is, the less convenient it may become to use CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 11
  • 12. © Cengage Learning 2015 Understanding Security CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 12
  • 13. © Cengage Learning 2015 Defining Information Security • Information security - the tasks of securing information that is in a digital format: – Manipulated by a microprocessor – Stored on a storage device – Transmitted over a network • Information security goal - to ensure that protective measures are properly implemented to ward off attacks and prevent the total collapse of the system when a successful attack occurs CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 13
  • 14. © Cengage Learning 2015 Defining Information Security • Three types of information protection: often called CIA – Confidentiality • Only approved individuals may access information – Integrity • Information is correct and unaltered – Availability • Information is accessible to authorized users CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 14
  • 15. © Cengage Learning 2015 Defining Information Security • Protections implemented to secure information – Authentication • Ensures the individual is who they claim to be – Authorization • Provides permission or approval to specific technology resources – Accounting • Provides tracking of events CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 15
  • 16. © Cengage Learning 2015 Defining Information Security • Information security is achieved through a process that is a combination of three entities: – Information and the hardware – Software – Communications • These entities are protected in three layers: – Products – People – Policies and procedures CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 16
  • 17. © Cengage Learning 2015 Defining Information Security CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 17
  • 18. © Cengage Learning 2015CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition Defining Information Security 18
  • 19. © Cengage Learning 2015 Information Security Terminology • Asset – Item that has value • Threat – Type of action that has the potential to cause harm • Threat agent – A person or element with power to carry out a threat CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 19
  • 20. © Cengage Learning 2015 Information Security Terminology CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 20
  • 21. © Cengage Learning 2015 Information Security Terminology • Vulnerability – Flaw or weakness that allows a threat agent to bypass security • Threat vector – The means by which an attack can occur • Threat likelihood – Likelihood that threat agent will exploit vulnerability • Risk – A situation that involves exposure to some type of danger CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 21
  • 22. © Cengage Learning 2015 Information Security Terminology • Options to deal with risk: – Risk avoidance - involves identifying the risk but not engaging in the activity – Acceptance - risk is acknowledged but no steps are taken to address it – Risk mitigation - the attempt to address the risks by making risk less serious – Deterrence - understanding the attacker and then informing him of the consequences of his actions – Transference - transferring the risk to a third party CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 22
  • 23. © Cengage Learning 2015 Information Security Terminology CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 23
  • 24. © Cengage Learning 2015 Understanding the Importance of Information Security • Information security can be helpful in: – Preventing data theft – Thwarting identity theft – Avoiding the legal consequences of not securing information – Maintaining productivity – Foiling cyberterrorism CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 24
  • 25. © Cengage Learning 2015 Preventing Data Theft • Preventing data from being stolen is often the primary objective of an organization’s information security • Business data theft involves stealing proprietary business information • Personal data theft involves stealing credit card numbers CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 25
  • 26. © Cengage Learning 2015 Thwarting Identity Theft • Identity theft – Stealing another person’s personal information • Usually using it for financial gain – Example: • Steal person’s SSN • Create new credit card account to charge purchases and leave them unpaid • File fraudulent tax returns CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 26
  • 27. © Cengage Learning 2015 Avoiding Legal Consequences • Laws protecting electronic data privacy: – The Health Insurance Portability and Accountability Act of 1996 (HIPAA) – The Sarbanes-Oxley Act of 2002 (Sarbox) – The Gramm-Leach-Bliley Act (GLBA) – Payment Card Industry Data Security Standard (PCI DSS) – California’s Database Security Breach Notification Act (2003) CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 27
  • 28. © Cengage Learning 2015 Maintaining Productivity • Post-attack clean up diverts resources away from normal activities – Time, money, and other resources CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 28
  • 29. © Cengage Learning 2015 Foiling Cyberterrorism • Cyberterrorism – Any premeditated, politically motivated attack against information, computer systems, computer programs, and data • Designed to: – Cause panic – Provoke violence – Result in financial catastrophe • May be directed at targets such as the banking industry, power plants, air traffic control centers, and water systems CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 29
  • 30. © Cengage Learning 2015 Who Are the Attackers? • Hacker - person who uses computer skills to attack computers • Black hat hackers – Violate computer security for personal gain and the goal is to inflict malicious damage • White hat hackers – Goal to expose security flaws, not to steal or corrupt data • Gray hat hackers – Goal is to break into a system without owner’s permission, but not for their own advantage CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 30
  • 31. © Cengage Learning 2015 Who Are the Attackers? • Categories of attackers – Cybercriminals – Script kiddies – Brokers – Insiders – Cyberterrorists – Hactivists – State-sponsored attackers CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 31
  • 32. © Cengage Learning 2015 Cybercriminals • A network of attackers, identity thieves, spammers, financial fraudsters – More highly motivated – Willing to take more risk – Well-funded – More tenacious • The goal of a cybercriminal is financial gain • Cybercrime - targeted attacks against financial networks and the theft of personal information CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 32
  • 33. © Cengage Learning 2015 Cybercriminals • Financial cybercrime is divided into two categories: – Individuals and businesses • Use stolen data, credit card numbers, online financial account information, or Social Security numbers to profit from victims – Businesses and governments • Attempt to steal research on a new product so they can sell it to an unscrupulous foreign supplier • Advanced Persistent Threat (APT) - multiyear intrusion campaign that targets highly sensitive economic, proprietary, or national security information CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 33
  • 34. © Cengage Learning 2015 Script Kiddies • Script kiddies - individuals who want to attack computers yet they lack the knowledge of computers and network needed to do so • They download automated hacking software (scripts) from websites • Over 40 percent of attacks require low or no skills • Exploit kits - automated attack package that can be used without an advanced knowledge of computers – Script kiddies either rent or purchase them CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 34
  • 35. © Cengage Learning 2015 Brokers • Brokers - attackers who sell knowledge of a vulnerability to other attackers or governments • Often hired by the vendor to uncover vulnerabilities – Instead they do not report it to the vendor but sell the information about the vulnerabilities to the highest bidder CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 35
  • 36. © Cengage Learning 2015 Insiders • Employees, contractors, and business partners • Over 48 percent of breaches attributed to insiders • Examples of insider attacks: – Health care worker may publicize celebrities’ health records • Disgruntled over upcoming job termination – Stock trader might conceal losses through fake transactions – Employees may be bribed or coerced into stealing data before moving to a new job CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 36
  • 37. © Cengage Learning 2015 Cyberterrorists • Cyberterrorists - an attacker whose motivation may be ideological or for the sake of principles or beliefs – Almost impossible to predict when or where the attack may occur • Targets may include: – A small group of computers or networks that can affect the largest number of users • Example: – Computers that control the electrical power grid of a state or region CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 37
  • 38. © Cengage Learning 2015 Hactivists • Hactivists - attackers who attack for ideological reasons that are generally not as well-defined as a cyberterrorist’s motivation • Examples of hactivist attacks: – Breaking into a website and changing the contents on the site to make a political statement – Disabling a website belonging to a bank because the bank stopped accepting payments that were deposited into accounts belonging to the hactivists CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 38
  • 39. © Cengage Learning 2015 State-Sponsored Attackers • State-sponsored attacker - an attacker commissioned by the governments to attack enemies’ information systems – May target foreign governments or even citizens of the government who are considered hostile or threatening • Examples of attacks: – Malware targeting government or military computers – Citizens having their email messages read without their knowledge CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 39
  • 40. © Cengage Learning 2015 Attacks and Defenses • A wide variety of attacks can be launched – The same basic steps are used in most attacks • To protect computers against attacks follow five fundamental security principles CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 40
  • 41. © Cengage Learning 2015 Steps of an Attack • Cyber Kill Chain outlines the steps of an attack: – 1. Reconnaissance - probe for information about the system: type of hardware or software used – 2. Weaponization - attacker creates an exploit and packages it into a deliverable payload – 3. Delivery - weapon is transmitted to the target – 4. Exploitation - after weapon is delivered, the exploitation stage triggers the intruder’s exploit – 5. Installation - the weapon is installed to either attack the computer or install a remote “backdoor” CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 41
  • 42. © Cengage Learning 2015 Steps of an Attack • Cyber Kill Chain outlines the steps of an attack (cont’d): – 6. Command and Control - the comprised system connects back to the attacker so that the system can be remotely controlled by the attacker – 7. Action on Objectives - now the attackers can start to take actions to achieve their original objectives CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 42
  • 43. © Cengage Learning 2015CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition Defenses Against Attacks • Five fundamental security principles for defenses: – Layering – Limiting – Diversity – Obscurity – Simplicity 43
  • 44. © Cengage Learning 2015 Layering • Information security must be created in layers – A single defense mechanism may be easy to circumvent – Making it unlikely that an attacker can break through all defense layers • Layered security approach – Can be useful in resisting a variety of attacks – Provides the most comprehensive protection CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 44
  • 45. © Cengage Learning 2015 Limiting • Limiting access to information: – Reduces the threat against it • Only those who must use data should be granted access – Should be limited to only what they need to do their job • Methods of limiting access – Technology-based - such as file permissions – Procedural - such as prohibiting document removal from premises CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 45
  • 46. © Cengage Learning 2015 Diversity • Closely related to layering – Layers must be different (diverse) • If attackers penetrate one layer: – Same techniques will be unsuccessful in breaking through other layers • Breaching one security layer does not compromise the whole system • Example of diversity – Using security products from different manufacturers CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 46
  • 47. © Cengage Learning 2015 Obscurity • Obscuring inside details to outsiders • Example: not revealing details – Type of computer – Operating system version – Brand of software used • Difficult for attacker to devise attack if system details are unknown CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 47
  • 48. © Cengage Learning 2015 Simplicity • Nature of information security is complex • Complex security systems: – Can be difficult to understand and troubleshoot – Are often compromised for ease of use by trusted users • A secure system should be simple from the inside – But complex from the outside CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 48
  • 49. © Cengage Learning 2015 Summary • Information security attacks have grown exponentially in recent years • It is difficult to defend against today’s attacks • Information security protects information’s integrity, confidentiality, and availability: – On devices that store, manipulate, and transmit information – Using products, people, and procedures CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 49
  • 50. © Cengage Learning 2015 Summary • Main goals of information security – Prevent data theft – Thwart identity theft – Avoid legal consequences of not securing information – Maintain productivity – Foil cyberterrorism • Different types of people with different motivations conduct computer attacks • An attack has seven general steps known as the Cyber Kill Chain CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 50

Hinweis der Redaktion

  1. About the Presentations The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning of each presentation. You may customize the presentations to fit your class needs. Some figures from the chapters are included. A complete set of images from the book can be found on the Instructor Resources disc.
  2. CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition Chapter 1 Introduction to Security
  3. Objectives Describe the challenges of securing information Define information security and explain why it is important Identify the types of attackers that are common today List the basic steps of an attack Describe the five basic principles of defense
  4. Challenges of Securing information No simple solution Many different types of attacks Defending against attacks is often difficult
  5. Today’s Security Attacks Examples of recent attacks Attack on a credit card processing company that handles prepaid debit cards Taking control of wireless cameras ATM machine attacks Taking over Twitter accounts Serial server attacks Attackers using online sites such as Craigslist and eBay to lure victims to download malware Penetration of Apple’s very own network
  6. Today’s Security Attacks Table 1-1 Selected security breaches involving personal information in a one-month period
  7. Difficulties in Defending Against Attacks Universally connected devices Increased speed of attacks Greater sophistication of attacks Availability and simplicity of attack tools Faster detection of vulnerabilities
  8. Difficulties in Defending Against Attacks Delays in security updating Weak security update distribution Distributed attacks Introduction of BYOD User confusion
  9. Difficulties in Defending Against Attacks Table 1-2 Difficulties in defending against attacks
  10. What Is Information Security? Before defense is possible, one must understand: Exactly what security is How security relates to information security The terminology that relates to information security
  11. Understanding Security Security is: The goal to be free from danger The process that achieves that freedom Harm/danger may come from one of two sources: From a direct action that is intended to inflict damage From an indirect and unintentional action As security is increased, convenience is often decreased The more secure something is, the less convenient it may become to use
  12. Understanding Security Figure 1-2 Relationship of security to convenience
  13. Defining Information Security Information security - the tasks of securing information that is in a digital format: Manipulated by a microprocessor Stored on a storage device Transmitted over a network Information security goal - to ensure that protective measures are properly implemented to ward off attacks and prevent the total collapse of the system when a successful attack occurs
  14. Defining Information Security Three types of information protection: often called CIA Confidentiality Only approved individuals may access information Integrity Information is correct and unaltered Availability Information is accessible to authorized users
  15. Defining Information Security Protections implemented to secure information Authentication Ensures the individual is who they claim to be Authorization Provides permission or approval to specific technology resources Accounting Provides tracking of events
  16. Defining Information Security Information security is achieved through a process that is a combination of three entities: Information and the hardware Software Communications These entities are protected in three layers: Products People Policies and procedures
  17. Defining Information Security Figure 1-3 Information security layers
  18. Defining Information Security Table 1-3 Information security layers
  19. Information Security Terminology Asset Item that has value Threat Type of action that has the potential to cause harm Threat agent A person or element with power to carry out a threat
  20. Information Security Terminology Table 1-4 Information technology assets
  21. Information Security Terminology Vulnerability Flaw or weakness that allows a threat agent to bypass security Threat vector The means by which an attack can occur Threat likelihood Likelihood that threat agent will exploit vulnerability Risk A situation that involves exposure to some type of danger
  22. Information Security Terminology Options to deal with risk: Risk avoidance - involves identifying the risk but not engaging in the activity Acceptance - risk is acknowledged but no steps are taken to address it Risk mitigation - the attempt to address the risks by making risk less serious Deterrence - understanding the attacker and then informing him of the consequences of his actions Transference - transferring the risk to a third party
  23. Information Security Terminology Table 1-5 Information security terminology
  24. Understanding the Importance of Information Security Information security can be helpful in: Preventing data theft Thwarting identity theft Avoiding the legal consequences of not securing information Maintaining productivity Foiling cyberterrorism
  25. Preventing Data Theft Preventing data from being stolen is often the primary objective of an organization’s information security Business data theft involves stealing proprietary business information Personal data theft involves stealing credit card numbers
  26. Thwarting Identity Theft Identity theft Stealing another person’s personal information Usually using it for financial gain Example: Steal person’s SSN Create new credit card account to charge purchases and leave them unpaid File fraudulent tax returns
  27. Avoiding Legal Consequences Laws protecting electronic data privacy: The Health Insurance Portability and Accountability Act of 1996 (HIPAA) The Sarbanes-Oxley Act of 2002 (Sarbox) The Gramm-Leach-Bliley Act (GLBA) Payment Card Industry Data Security Standard (PCI DSS) California’s Database Security Breach Notification Act (2003)
  28. Maintaining Productivity Post-attack clean up diverts resources away from normal activities Time, money, and other resources Table 1-6 Cost of attacks
  29. Foiling Cyberterrorism Cyberterrorism Any premeditated, politically motivated attack against information, computer systems, computer programs, and data Designed to: Cause panic Provoke violence Result in financial catastrophe May be directed at targets such as the banking industry, power plants, air traffic control centers, and water systems
  30. Who Are the Attackers? Hacker - person who uses computer skills to attack computers Black hat hackers Violate computer security for personal gain and the goal is to inflict malicious damage White hat hackers Goal to expose security flaws, not to steal or corrupt data Gray hat hackers Goal is to break into a system without owner’s permission, but not for their own advantage
  31. Who Are the Attackers? Categories of attackers Cybercriminals Script kiddies Brokers Insiders Cyberterrorists Hactivists State-sponsored attackers
  32. Cybercriminals A network of attackers, identity thieves, spammers, financial fraudsters More highly motivated Willing to take more risk Well-funded More tenacious The goal of a cybercriminal is financial gain Cybercrime - targeted attacks against financial networks and the theft of personal information
  33. Cybercriminals Financial cybercrime is divided into two categories: Individuals and businesses Use stolen data, credit card numbers, online financial account information, or Social Security numbers to profit from victims Businesses and governments Attempt to steal research on a new product so they can sell it to an unscrupulous foreign supplier Advanced Persistent Threat (APT) - multiyear intrusion campaign that targets highly sensitive economic, proprietary, or national security information
  34. Script Kiddies Script kiddies - individuals who want to attack computers yet they lack the knowledge of computers and network needed to do so They download automated hacking software (scripts) from websites Over 40 percent of attacks require low or no skills Exploit kits - automated attack package that can be used without an advanced knowledge of computers Script kiddies either rent or purchase them
  35. Brokers Brokers - attackers who sell knowledge of a vulnerability to other attackers or governments Often hired by the vendor to uncover vulnerabilities Instead they do not report it to the vendor but sell the information about the vulnerabilities to the highest bidder
  36. Insiders Employees, contractors, and business partners Over 48 percent of breaches attributed to insiders Examples of insider attacks: Health care worker may publicize celebrities’ health records Disgruntled over upcoming job termination Stock trader might conceal losses through fake transactions Employees may be bribed or coerced into stealing data before moving to a new job
  37. Cyberterrorists Cyberterrorists - an attacker whose motivation may be ideological or for the sake of principles or beliefs Almost impossible to predict when or where the attack may occur Targets may include: A small group of computers or networks that can affect the largest number of users Example: Computers that control the electrical power grid of a state or region
  38. Hactivists Hactivists - attackers who attack for ideological reasons that are generally not as well-defined as a cyberterrorist’s motivation Examples of hactivist attacks: Breaking into a website and changing the contents on the site to make a political statement Disabling a website belonging to a bank because the bank stopped accepting payments that were deposited into accounts belonging to the hactivists
  39. State-Sponsored Attackers State-sponsored attacker - an attacker commissioned by the governments to attack enemies’ information systems May target foreign governments or even citizens of the government who are considered hostile or threatening Examples of attacks: Malware targeting government or military computers Citizens having their email messages read without their knowledge
  40. Attacks and Defenses A wide variety of attacks can be launched The same basic steps are used in most attacks To protect computers against attacks follow five fundamental security principles
  41. Steps of an Attack Cyber Kill Chain outlines the steps of an attack: 1. Reconnaissance - probe for information about the system: type of hardware or software used 2. Weaponization - attacker creates an exploit and packages it into a deliverable payload 3. Delivery - weapon is transmitted to the target 4. Exploitation - after weapon is delivered, the exploitation stage triggers the intruder’s exploit 5. Installation - the weapon is installed to either attack the computer or install a remote “backdoor”
  42. Steps of an Attack Cyber Kill Chain outlines the steps of an attack (cont’d): 6. Command and Control - the comprised system connects back to the attacker so that the system can be remotely controlled by the attacker 7. Action on Objectives - now the attackers can start to take actions to achieve their original objectives
  43. Defenses Against Attacks Five fundamental security principles for defenses: Layering Limiting Diversity Obscurity Simplicity
  44. Layering Information security must be created in layers A single defense mechanism may be easy to circumvent Making it unlikely that an attacker can break through all defense layers Layered security approach Can be useful in resisting a variety of attacks Provides the most comprehensive protection
  45. Limiting Limiting access to information: Reduces the threat against it Only those who must use data should be granted access Should be limited to only what they need to do their job Methods of limiting access Technology-based - such as file permissions Procedural - such as prohibiting document removal from premises
  46. Diversity Closely related to layering Layers must be different (diverse) If attackers penetrate one layer: Same techniques will be unsuccessful in breaking through other layers Breaching one security layer does not compromise the whole system Example of diversity Using security products from different manufacturers
  47. Obscurity Obscuring inside details to outsiders Example: not revealing details Type of computer Operating system version Brand of software used Difficult for attacker to devise attack if system details are unknown
  48. Simplicity Nature of information security is complex Complex security systems: Can be difficult to understand and troubleshoot Are often compromised for ease of use by trusted users A secure system should be simple from the inside But complex from the outside
  49. Summary Information security attacks have grown exponentially in recent years It is difficult to defend against today’s attacks Information security protects information’s integrity, confidentiality, and availability: On devices that store, manipulate, and transmit information Using products, people, and procedures
  50. Summary Main goals of information security Prevent data theft Thwart identity theft Avoid legal consequences of not securing information Maintain productivity Foil cyberterrorism Different types of people with different motivations conduct computer attacks An attack has seven general steps known as the Cyber Kill Chain