SlideShare ist ein Scribd-Unternehmen logo
1 von 43
INTRO TO IT
SECURITY

             By
     Cade Zvavanjanja
            CISO
Gainful Information Security
AGENDA
 Information Security
 Information Privacy

 Risk Management

 Opportunities & Markets

 Some Examples
Holistic IT security

  Vetting /                             Information
 References         Business              Security
Disciplinary       Interfaces             Policies
 Procedure
                                       Build Standards
Awareness &
 Training            IT/IS/
                                          Threat
                                         Modelling
 Anti-Virus      Development
                                         Security in
  Patch                                    SDLC
Management
                                         Application
Vulnerability
 Assessment
                 Data Storage             Testing
                                        Penetration
Configuration                             Testing
  Reviews
                                       Access Control
 Encryption
                  Ecommerce
                                          Reviews
                     Site
  Firewalls                             Legislative
                                        Compliance
  Intrusion
  Detection

                                                         3
INFORMATION WARFARE
THE MATRIX UPLOADED – SO
WHAT?
TODAY’S TREND




Terrorists   White Collar   Insider/Espionage     Open
               Crime                             Source




Disasters       Theft           Scripts         ID Theft
IT Security
SO WHO CARES?
   You care about information security and privacy
    because:
        Information Security is a constant and a critical need
        Threats are becoming increasingly sophisticated
        Countermeasures are evolving to meet the threats
        You want to protect your asset and privacy
        You want to know what tools are there for protection and
         Because information security, information privacy and
         legal and compliance are inter-related
INCREASE IN SECURITY
                                 INCIDENTS
                       900M                                                                                      120,000

                       800M                                                          Blended Threats             100,000




                                                                                                                                   Network Intrusion Attempts
                       700M                                                     (CodeRed, Nimda, Slammer)
Infection Attempts



                       600M                                            Denial of Service                         80,000
                                                                        (Yahoo!, eBay)
                       500M
                                                         Mass Mailer Viruses                                     60,000
                       400M                             (Love Letter/Melissa)
                       300M                                              Malicious Code                          40,000
                                                    Zombies              Infection
                       200M                                              Attempts*              Network
                                     Polymorphic Viruses                                                         20,000
                                                                                                Intrusion
                       100M               (Tequila)
                                                                                                Attempts**
                          0                                                                                      0
                          1995        1996       1997         1998       1999         2000       2001        2002

                                   *Analysis by Symantec Security Response using data from Symantec, IDC & ICSA; 2002 estimated
                                                                                               **Source: CERT
                              CERTCC Reported Vulnerabilities 1988-2003


                                                                                                Total Number of Incidents
                     140000                                                                   Reported from 1988-2003 is 319,992
                     120000
                                                                                                Average Yearly Increase of 40%
                     100000
                     80000                                           CERTCC Reported
                     60000                                           Vulnerabilities
                     40000
                     20000
                         0
SOME POLLS SUGGEST
SOURCE CSO



   Which of the following is #1 priority
      Wireless Security (16%)
      Spam/AntiVirus (17%)
      Identity Management (27%)
      Disaster Recovery (21%)
      Other (19%)
   Which of the following poses the greatest threat
      Natural Disaster (36%)
      Terrorist Attack (12%)
      Cyberattack (52%)
SCARY DATA
   US Government Data                           Industry Data
        Id theft is perpetrated by                   ID theft increased to 81%
         hackers and their associates
         who steal personal information                in 2002
         and identity (e.g. social security           Main cause for fraud is id
         numbers) in order to commit
         various forms of fraud by                     theft
         assuming your identity                       U.S.-based banks
        FTC reports that over 27.3                     37 percent said identify
         million Americans in the past 5
         years reported their ID stolen                  theft significantly
        FTC survey revealed that ID                     increased
         theft costs consumers and                      34 percent said it
         business 53 billion in 2002
                                                         slightly increased
        The FBI estimates that the
         number one threat to internet                  24 percent said identity
         users is identity theft                         theft rates had stayed
        Approximately 350,000 to                        the same
         500,000 citizens fall victims to               5 percent reported that
         “id theft” every year.
                                                         the rates decreased
CYBERTERRORISM
“Cyberterrorism is any "premeditated, politically
motivated attack against information, computer
systems, computer programs, and data which
results in violence against non-combatant targets by
sub-national groups or clandestine agents."
Cyberterrorism is sometimes referred to as
electronic terrorism or information war.”
                U.S. Federal Bureau of Investigation
INFORMATION WARFARE
    Use of or attacks on information and information
     infrastructure to achieve strategic objectives
    Tools in hostilities among
       Nations
       Trans-national  groups (companies, NGOs,
        associations, interest groups, terrorists)
       Corporate entities (corporations, companies,
        government agencies)
       Individuals
LEVELS OF INFORMATION
WARFARE
     Against individuals
        Theft,impersonation
        Extortion, blackmail
        Defamation, racism
     Against organizations
        Industrial   espionage
        Sabotage
        Competitive   intelligence
     Against nations
        Disinformation, destabilization
        Infrastructure destabilization
        Economic collapse
PRIME TARGETS
            Companies with hiring volatilities
    •   Financial, communication, manufacturing, transportation and
        retail

            Companies with lower volatility
    •   Utilities, government, healthcare and education

            Areas
    •   IDS, Firewall, Anti virus, Identity management
    •   Product design, policy
    •   Privacy vs. Security
    •   Security administration
    •   Training and awareness
POTENTIAL TARGETS AGAINST OUR
INFRASTRUCTURE
 Electricity
 Transportation
 Water
 Energy
 Financial
 Information Technology
 Emergency Services
 Government Operations
WHY USE CYBER WARFARE?


 Low barriers to entry – laptops cost a lot less
  than tanks and bombs
 Our world is dependent on computers, networks,
  and the Internet
 Denial of service has economic, logistical, and
  emotional effect
 Low cost to level the playing field
INFORMATION WARFARE STRATEGIES

   The basic elements are:
      Hacking
      Malicious code
      Electronic snooping
      Old-fashioned human spying
 Mass disruption can be unleashed over the
  internet, but
 Attackers must first compromise private and
  secure networks (i.e. Unclassified, Secret, Top
  Secret)
WHAT ARE THE METHODS?
   Password cracking              Network eavesdropping
   Viruses                        Intrusion attacks
   Trojan horses / RATS           Network spoofing
   Worms
                                   Session hijacking
   Denial-of-service attacks
   E-mail impersonation           Packet replay
   E-mail eavesdropping           Packet modification
   Network packet modification
                                   Cryptography

                                   Steganography

                                   Identity theft
HACKERS INFORMATION WARRIORS?

Inflicting damage           Personal motives
                               Retaliate or ”get even”
 Alter, damage or delete      Political or terrorism
    information                Make a joke
                               Show off/Just Because
 Deny services
                            Elite Hackers
 Damage public image             Black Hat
                                  Grey Hat
                                  White Hat
                                  No hat
Economic gain                  Malicious Code Writers
   Steal information
                               Criminal Enterprises
                               Trusted Insiders
   Blackmail
   Financial fraud
THE TRADITIONAL HACKER ETHIC
i.     Access to computers should be unlimited and total
ii.    All information should be free
iii.   Mistrust authority – promote decentralization
iv.    Hackers should be judged by their hacking, not criteria
       such as age, race, etc.
v.     You can create art and beauty on the computer
vi.    Computers can change your life for the better
GEOPOLITICAL HOTSPOTS -TRENDS

                                    WESTERN EUROPE
                                    Cyber-activists with anti-
                                                                     EASTERN EUROPE/RUSSIA
                                    global/anti-capitalism
                                                                     Malicious code development; fraud
                                    goals; some malicious
                                                                     and financial hacking
                                    code
                                                                                                          CHINA
                                                                                                          Targeting Japan, U.S., Taiwan and
                                                                                                          perceived allies of those countries
U.S.
Multiple hacker/cyber-
activist/hacktivist groups;
random targets                                     MIDDLE EAST
                                                   Palestinian hackers target           INDIA-PAKISTAN
                                                   Israeli .il websites; some pro-      Worldwide targets, Kashmir-
                                                   Israel activity                      related and Muslim-related
                                                                                        defacements

                              BRAZIL
                              Multiple hacker groups,
                              many mercenary;
                              random targets
A BALANCED SECURITY
    ARCHITECTURE
 Single, unifying infrastructure that many
  applications can leverage
 A good security architecture:
     Provides a core set of security services
     Is modular
     Provides uniformity of solutions
     Supports existing and new applications               Policy,
     Contains technology as one component of a          Standards,
                                                        and Process
      complete security program
     Incorporates policy and standards as well as
      people, process, and technology
                                                     People   Technology
BASIC INFORMATION SECURITY
    COMPONENTS
   AUTHENTICATION:                           NONREPUDIATION:
        How do we know who is using the            Can we provide for non-
         service?                                   repudiation of a transaction?
   ACCESS CONTROL:                           AUDITABILITY &
        Can we control what they do?
                                               AVAILABILITY
                                                   Do we know:
   CONFIDENTIALITY:
                                                     Whether there is a
        Can we ensure the privacy of                 problem? Whether it’s
         information?
                                                      soon enough to take
   DATA INTEGRITY:                                   appropriate action?
                                                     How to minimize/contain
        Can we prevent unauthorized
         changes to information?                      the problem?
                                                     How to prevent denial of

                                                      service?
DATA GOVERNANCE & CONTROLS


     X             X                 X              X                 X               X Application                       Information
                                                                                                                         Management
     X                               X Networks X                                                       X                Infrastructure
                                                                                                                             (IMI)

     X             X                 X                          OS                                      X                   Threats
                                                                                                                      Disclosure of information

                                                                                     Non-repudiation
 Authentication




                                                                                                                        Unauthorized access
                  Confidentiality




                                                   Data Integrity


                                                                     Audit ability
                                    Access Cntrl




                                                                                                       Availability
                                                                                                                          Loss of integrity
                                                                                                                          Denial of service
INFORMATION SECURITY CONTROL
AREAS
   Information Security Policies
   Roles and Responsibilities
   Asset Classification and Handling
   Personal Security
   Physical Security
   System and Operations Management Controls
   General Access Controls
   System Development Life Cycle
   Business Continuity
   Compliance, Legal and Regulatory
WHAT IS @RISK?
   Financial & Monetary Loss Risk
        Payroll information leakage
   Reputation Risk
      Distributed attacks from campus
      Terrorism
      Laptop theft
      ID Theft
   Litigation & Regulatory Risk
        HIPAA, GLB, CA 1386
INFORMATION SECURITY BODIES,
STANDARDS & PRIVACY LAWS
   Standards & Privacy Laws
      British Standards (ISO 17799)
      EU Data Protection Act of 1998 (DPA)
      Health Insurance Portability and Accountability Act (HIPAA)
      Fair Credit Reporting Act (FCRA)
   National Institute for Standards & Technology (www.NIST.gov):
      Founded in 1901, NIST is a non-regulatory federal agency within the
       U.S. Commerce Department's Technology Administration.
      NIST's mission is to develop and promote measurements, standards,
       and technology to enhance productivity, facilitate trade, and improve
       the quality of life.
   Computer Emergency Response Team www.cert.org:
        The CERT® Coordination Center (CERT/CC) is a center of Internet
         security expertise at the Software Engineering Institute, a federally
         funded research and development center operated by
         Carnegie Mellon University.
Information Privacy
Privacy Governance Architecture

                                      Process
                                       Process                       Opt/in/out
                                                                     Opt/in/out
Security/Pr
 Security/Pr                       Organization
   ivacy                           Organization
    ivacy                                                                                                   Compliance
  Policy
    Policy
                                    Technology                       Regulatory
                                                                      Regulatory
                                     Technology                     Requirement
                                                                     Requirement
                                       People
                                        People



 Planning and                                                                   Program Metrics
   Strategy                               Program Maturity
• •Privacy Strategy                 • •Privacy Risk Assessments      • •External Support Infrastructure
    Privacy Strategy                     Privacy Risk Assessments         External Support Infrastructure
• •Data Classification Analysis     • •Data Governance               • •Privacy Auditing
    Data Classification Analysis         Data Governance                  Privacy Auditing
• •Privacy Teams                    • •Vendor Governance             • •Incident Response
    Privacy Teams                        Vendor Governance                Incident Response
• •Policy Development               • •Technology Planning           • •Crisis Management
    Policy Development                   Technology Planning              Crisis Management
• •Policy Update Plans              • •Business Process Review       • •Knowledge Management
    Policy Update Plans                  Business Process Review          Knowledge Management
• Decision Management               • Information Security           • •Consumer Support Infrastructure
  • Decision Management               • Information Security              Consumer Support Infrastructure
• •Privacy Support Architecture     • •Information Privacy           • •Open Source Intelligence
    Privacy Support Architecture         Information Privacy              Open Source Intelligence
• •Awareness
    Awareness
HIGH LEVEL OVERVIEW

    - Notify client
    - Notify regulators
    - Remediate
    - Analyze long                                                                  - Detect Incident
    term effects                         Resolution &                               - Identify source of
                                                        Detection                   identified
    - Analyze lessons                     Reporting
    learned                                                                         -Log incident
                                                                                    - Reduce false positive




                                                 Privacy                              - Determine scope
                                                                                      - Assemble Response

                              Digital           Incident             Assessment
                                                                                      Team
                                                                                      - Collect & sort facts

                                                Response
                             Forensics


                                                 Process
- Engage digital forensics
process
                                                                                                     - Determine
- Collect evidence
                                                                                                     scope
- Engage 3rd party
                                         Containment    Analysis                                     - Assemble
                                                                                                     Response Team
                                                                                                     - Collect & sort
                                                                    -Technology containment
                                                                                                     facts
                                                                    - Process containment
                                                                    - Procedure containment
Information Security &
       Privacy
  Risk Management
RISK MITIGATION
   100% Risk Mitigation and not 100 % control
   Good Information Management Infrastructure
    that
      Provides modular core set of controls
      Supports existing, infrastructures and new
       applications                                                             Policies,
      Incorporates policy and standards, people, process,
                                                        People                 Standards &
       and technology                                                           Guidelines
      Provides a horizontal and vertical risk SELF or
       AUTOMATIC assessment program                              Equilibrium
      Provides collaborative issues resolution system             Point
   Balanced Information Management
    Infrastructure (IMI)
   Risk Mitigation
      Vertical – up and down controls in branches and
       business units
      Horizontal – policies, best practices, processes and      Information
       priorities across the organization                        Technology
RISK MANAGEMENT METHODOLOGY


                             Risk Assessment




    Risk Tolerance                              Organizational Dynamics

                                 Point of
                                 Balance




        Key Risk Indicator                     Risk Takers
Key Risk Indicators

Asset Value                                 Stakeholders




                                 Pen Testing                           Site Reviews

                                                           Vendor
                     Audit
                                                           Reviews



                   Regulatory     Compliance               Self           Security
 Loss Amount/ROI




                                                        Assessment       & Privacy
                                                                         Incidents




Business Impact                 Risk Evaluation Model                Risk Rating
Market Opportunities
DEMAND – BASED ON GARTNER
STUDIES
 General IT staff outsourcing has gone up 24%
  since US recession was over
 Growth in IT staff augmentation will be limited
  and in single digits
     Security outsourcing is trending up
     Identity management
     Vulnerability Assessment
     Operations
           Firewall management, anti virus and IDS
INFOSEC PEOPLE
    Typical jobs for contract
         Business Intelligence
         Business Analysis
         Risk Management
         Information Security Officer
         Information Privacy Officer
         Digital Forensics Experts
    Job seeker support to help professionals identify new
     career opportunities when they are unemployed or
     contingency searching due to circumstances at their
     workplace;
    Contractor placement to help independent contractors
     identify and secure short and long term contract work
     based on hourly rates; and
    Corporate candidate search to help clients identify
     candidates for new or vacant positions, as well as
     contingency searching to stage replacement of human
     resources
TYPES OF RECRUITING
   Contract & Temporary – constant spread based
      Profit margins are small
      Limited
      Hourly, weekly monthly
   Permanent – one time commission based
      Entry levels
      Mid levels
      Management, Technical, Operations, Design &
       Architecture
   Outsourcing – profit margins are high
Some Examples
WHAT IS SOCIAL ENGINEERING
 Social Engineering is the art and science of use to
  trick one or more human beings to do what an
  attackers wants them to do or to reveal information
  that compromises a target’s security.
 Classic Social Engineering scams include, posing as
  a field service technician, calling an operator to
  reveal private information such as passwords and
  the like.
 Social Engineering is an evolving art that uses the
  simplest and most creative schemes and involves
  minimal technical expertise
TERRORISTS AND
STEGANOGRAPHY?
Thank You


Tel: +236 733 782 490
    +263 773 796 365
    +263 -4- 733 117


Eml: info@gis.co.zw
    cade@gis.co.zw


Web: www.gis.co.zw

Weitere ähnliche Inhalte

Ähnlich wie Introduction to IT Security

Security is Hard
Security is HardSecurity is Hard
Security is Hard
Mike Murray
 
Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-b
BbAOC
 
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
Ulf Mattsson
 

Ähnlich wie Introduction to IT Security (20)

Thy myth of hacking Oracle
Thy myth of hacking OracleThy myth of hacking Oracle
Thy myth of hacking Oracle
 
Unraveling the Latest Cybersecurity Trends in 2024
Unraveling the Latest Cybersecurity Trends in 2024Unraveling the Latest Cybersecurity Trends in 2024
Unraveling the Latest Cybersecurity Trends in 2024
 
What makes the IT industry tick?
What makes the IT industry tick? What makes the IT industry tick?
What makes the IT industry tick?
 
Rainer+3e Student Pp Ts Ch03
Rainer+3e Student Pp Ts Ch03Rainer+3e Student Pp Ts Ch03
Rainer+3e Student Pp Ts Ch03
 
Security is Hard
Security is HardSecurity is Hard
Security is Hard
 
Current Trends in Cyber Crime 2015
Current Trends in Cyber Crime 2015Current Trends in Cyber Crime 2015
Current Trends in Cyber Crime 2015
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
DSS ITSEC CONFERENCE - Lumension Security - Real Time Risk & Compliance Man...
DSS   ITSEC CONFERENCE - Lumension Security - Real Time Risk & Compliance Man...DSS   ITSEC CONFERENCE - Lumension Security - Real Time Risk & Compliance Man...
DSS ITSEC CONFERENCE - Lumension Security - Real Time Risk & Compliance Man...
 
Risci Bisnas (2003)
Risci Bisnas (2003)Risci Bisnas (2003)
Risci Bisnas (2003)
 
Security Threats in IT Infographic
Security Threats in IT InfographicSecurity Threats in IT Infographic
Security Threats in IT Infographic
 
2009 Kl Cybercrime Kaspersky
2009 Kl Cybercrime Kaspersky2009 Kl Cybercrime Kaspersky
2009 Kl Cybercrime Kaspersky
 
Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-b
 
Safer Technology Through Threat Awareness and Response
Safer Technology Through Threat Awareness and ResponseSafer Technology Through Threat Awareness and Response
Safer Technology Through Threat Awareness and Response
 
Cybercrime and Business Process Hacking
Cybercrime and Business Process HackingCybercrime and Business Process Hacking
Cybercrime and Business Process Hacking
 
Alex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile World
Alex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile WorldAlex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile World
Alex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile World
 
Jedi mind tricks for building application security programs
Jedi mind tricks for building application security programsJedi mind tricks for building application security programs
Jedi mind tricks for building application security programs
 
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
 
The Future of Cybersecurity courses.pptx
The Future of Cybersecurity courses.pptxThe Future of Cybersecurity courses.pptx
The Future of Cybersecurity courses.pptx
 

Mehr von Cade Zvavanjanja

Cyber Security 2016 Cade Zvavanjanja1
Cyber Security 2016 Cade Zvavanjanja1Cyber Security 2016 Cade Zvavanjanja1
Cyber Security 2016 Cade Zvavanjanja1
Cade Zvavanjanja
 
Saigf 15 thematic-paper 7 - A case for multi-stakeholder partnerships for cri...
Saigf 15 thematic-paper 7 - A case for multi-stakeholder partnerships for cri...Saigf 15 thematic-paper 7 - A case for multi-stakeholder partnerships for cri...
Saigf 15 thematic-paper 7 - A case for multi-stakeholder partnerships for cri...
Cade Zvavanjanja
 

Mehr von Cade Zvavanjanja (10)

Cade zvavanjanja saigf cybercrime & security online
Cade zvavanjanja saigf cybercrime & security onlineCade zvavanjanja saigf cybercrime & security online
Cade zvavanjanja saigf cybercrime & security online
 
Cade zvavanjanja iot afigf online
Cade zvavanjanja iot afigf onlineCade zvavanjanja iot afigf online
Cade zvavanjanja iot afigf online
 
comesa cybersecurity
comesa cybersecuritycomesa cybersecurity
comesa cybersecurity
 
Cyber Security 2016 Cade Zvavanjanja1
Cyber Security 2016 Cade Zvavanjanja1Cyber Security 2016 Cade Zvavanjanja1
Cyber Security 2016 Cade Zvavanjanja1
 
A case for multi-stakeholder cybersecurity by zvavanjanja
A case for multi-stakeholder cybersecurity by zvavanjanjaA case for multi-stakeholder cybersecurity by zvavanjanja
A case for multi-stakeholder cybersecurity by zvavanjanja
 
Saigf 15 thematic-paper 7 - A case for multi-stakeholder partnerships for cri...
Saigf 15 thematic-paper 7 - A case for multi-stakeholder partnerships for cri...Saigf 15 thematic-paper 7 - A case for multi-stakeholder partnerships for cri...
Saigf 15 thematic-paper 7 - A case for multi-stakeholder partnerships for cri...
 
Cloud computing & service level agreements
Cloud computing & service level agreementsCloud computing & service level agreements
Cloud computing & service level agreements
 
Web application attacks using Sql injection and countermasures
Web application attacks using Sql injection and countermasuresWeb application attacks using Sql injection and countermasures
Web application attacks using Sql injection and countermasures
 
Gainful Information Security 2012 services
Gainful Information Security 2012 servicesGainful Information Security 2012 services
Gainful Information Security 2012 services
 
Top online frauds 2010
Top online frauds 2010Top online frauds 2010
Top online frauds 2010
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Kürzlich hochgeladen (20)

Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 

Introduction to IT Security

  • 1. INTRO TO IT SECURITY By Cade Zvavanjanja CISO Gainful Information Security
  • 2. AGENDA  Information Security  Information Privacy  Risk Management  Opportunities & Markets  Some Examples
  • 3. Holistic IT security Vetting / Information References Business Security Disciplinary Interfaces Policies Procedure Build Standards Awareness & Training IT/IS/ Threat Modelling Anti-Virus Development Security in Patch SDLC Management Application Vulnerability Assessment Data Storage Testing Penetration Configuration Testing Reviews Access Control Encryption Ecommerce Reviews Site Firewalls Legislative Compliance Intrusion Detection 3
  • 4. INFORMATION WARFARE THE MATRIX UPLOADED – SO WHAT?
  • 5. TODAY’S TREND Terrorists White Collar Insider/Espionage Open Crime Source Disasters Theft Scripts ID Theft
  • 7. SO WHO CARES?  You care about information security and privacy because:  Information Security is a constant and a critical need  Threats are becoming increasingly sophisticated  Countermeasures are evolving to meet the threats  You want to protect your asset and privacy  You want to know what tools are there for protection and Because information security, information privacy and legal and compliance are inter-related
  • 8. INCREASE IN SECURITY INCIDENTS 900M 120,000 800M Blended Threats 100,000 Network Intrusion Attempts 700M (CodeRed, Nimda, Slammer) Infection Attempts 600M Denial of Service 80,000 (Yahoo!, eBay) 500M Mass Mailer Viruses 60,000 400M (Love Letter/Melissa) 300M Malicious Code 40,000 Zombies Infection 200M Attempts* Network Polymorphic Viruses 20,000 Intrusion 100M (Tequila) Attempts** 0 0 1995 1996 1997 1998 1999 2000 2001 2002 *Analysis by Symantec Security Response using data from Symantec, IDC & ICSA; 2002 estimated **Source: CERT CERTCC Reported Vulnerabilities 1988-2003 Total Number of Incidents 140000 Reported from 1988-2003 is 319,992 120000 Average Yearly Increase of 40% 100000 80000 CERTCC Reported 60000 Vulnerabilities 40000 20000 0
  • 9. SOME POLLS SUGGEST SOURCE CSO  Which of the following is #1 priority  Wireless Security (16%)  Spam/AntiVirus (17%)  Identity Management (27%)  Disaster Recovery (21%)  Other (19%)  Which of the following poses the greatest threat  Natural Disaster (36%)  Terrorist Attack (12%)  Cyberattack (52%)
  • 10. SCARY DATA  US Government Data  Industry Data  Id theft is perpetrated by  ID theft increased to 81% hackers and their associates who steal personal information in 2002 and identity (e.g. social security  Main cause for fraud is id numbers) in order to commit various forms of fraud by theft assuming your identity  U.S.-based banks  FTC reports that over 27.3  37 percent said identify million Americans in the past 5 years reported their ID stolen theft significantly  FTC survey revealed that ID increased theft costs consumers and  34 percent said it business 53 billion in 2002 slightly increased  The FBI estimates that the number one threat to internet  24 percent said identity users is identity theft theft rates had stayed  Approximately 350,000 to the same 500,000 citizens fall victims to  5 percent reported that “id theft” every year. the rates decreased
  • 11. CYBERTERRORISM “Cyberterrorism is any "premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents." Cyberterrorism is sometimes referred to as electronic terrorism or information war.” U.S. Federal Bureau of Investigation
  • 12. INFORMATION WARFARE  Use of or attacks on information and information infrastructure to achieve strategic objectives  Tools in hostilities among  Nations  Trans-national groups (companies, NGOs, associations, interest groups, terrorists)  Corporate entities (corporations, companies, government agencies)  Individuals
  • 13. LEVELS OF INFORMATION WARFARE  Against individuals  Theft,impersonation  Extortion, blackmail  Defamation, racism  Against organizations  Industrial espionage  Sabotage  Competitive intelligence  Against nations  Disinformation, destabilization  Infrastructure destabilization  Economic collapse
  • 14. PRIME TARGETS  Companies with hiring volatilities • Financial, communication, manufacturing, transportation and retail  Companies with lower volatility • Utilities, government, healthcare and education  Areas • IDS, Firewall, Anti virus, Identity management • Product design, policy • Privacy vs. Security • Security administration • Training and awareness
  • 15. POTENTIAL TARGETS AGAINST OUR INFRASTRUCTURE  Electricity  Transportation  Water  Energy  Financial  Information Technology  Emergency Services  Government Operations
  • 16. WHY USE CYBER WARFARE?  Low barriers to entry – laptops cost a lot less than tanks and bombs  Our world is dependent on computers, networks, and the Internet  Denial of service has economic, logistical, and emotional effect  Low cost to level the playing field
  • 17. INFORMATION WARFARE STRATEGIES  The basic elements are:  Hacking  Malicious code  Electronic snooping  Old-fashioned human spying  Mass disruption can be unleashed over the internet, but  Attackers must first compromise private and secure networks (i.e. Unclassified, Secret, Top Secret)
  • 18. WHAT ARE THE METHODS?  Password cracking  Network eavesdropping  Viruses  Intrusion attacks  Trojan horses / RATS  Network spoofing  Worms  Session hijacking  Denial-of-service attacks  E-mail impersonation  Packet replay  E-mail eavesdropping  Packet modification  Network packet modification  Cryptography  Steganography  Identity theft
  • 19. HACKERS INFORMATION WARRIORS? Inflicting damage Personal motives  Retaliate or ”get even”  Alter, damage or delete  Political or terrorism information  Make a joke  Show off/Just Because  Deny services Elite Hackers  Damage public image  Black Hat  Grey Hat  White Hat  No hat Economic gain  Malicious Code Writers  Steal information  Criminal Enterprises  Trusted Insiders  Blackmail  Financial fraud
  • 20. THE TRADITIONAL HACKER ETHIC i. Access to computers should be unlimited and total ii. All information should be free iii. Mistrust authority – promote decentralization iv. Hackers should be judged by their hacking, not criteria such as age, race, etc. v. You can create art and beauty on the computer vi. Computers can change your life for the better
  • 21. GEOPOLITICAL HOTSPOTS -TRENDS WESTERN EUROPE Cyber-activists with anti- EASTERN EUROPE/RUSSIA global/anti-capitalism Malicious code development; fraud goals; some malicious and financial hacking code CHINA Targeting Japan, U.S., Taiwan and perceived allies of those countries U.S. Multiple hacker/cyber- activist/hacktivist groups; random targets MIDDLE EAST Palestinian hackers target INDIA-PAKISTAN Israeli .il websites; some pro- Worldwide targets, Kashmir- Israel activity related and Muslim-related defacements BRAZIL Multiple hacker groups, many mercenary; random targets
  • 22. A BALANCED SECURITY ARCHITECTURE  Single, unifying infrastructure that many applications can leverage  A good security architecture:  Provides a core set of security services  Is modular  Provides uniformity of solutions  Supports existing and new applications Policy,  Contains technology as one component of a Standards, and Process complete security program  Incorporates policy and standards as well as people, process, and technology People Technology
  • 23. BASIC INFORMATION SECURITY COMPONENTS  AUTHENTICATION:  NONREPUDIATION:  How do we know who is using the  Can we provide for non- service? repudiation of a transaction?  ACCESS CONTROL:  AUDITABILITY &  Can we control what they do? AVAILABILITY  Do we know:  CONFIDENTIALITY:  Whether there is a  Can we ensure the privacy of problem? Whether it’s information? soon enough to take  DATA INTEGRITY: appropriate action?  How to minimize/contain  Can we prevent unauthorized changes to information? the problem?  How to prevent denial of service?
  • 24. DATA GOVERNANCE & CONTROLS X X X X X X Application Information Management X X Networks X X Infrastructure (IMI) X X X OS X Threats Disclosure of information Non-repudiation Authentication Unauthorized access Confidentiality Data Integrity Audit ability Access Cntrl Availability Loss of integrity Denial of service
  • 25. INFORMATION SECURITY CONTROL AREAS  Information Security Policies  Roles and Responsibilities  Asset Classification and Handling  Personal Security  Physical Security  System and Operations Management Controls  General Access Controls  System Development Life Cycle  Business Continuity  Compliance, Legal and Regulatory
  • 26. WHAT IS @RISK?  Financial & Monetary Loss Risk  Payroll information leakage  Reputation Risk  Distributed attacks from campus  Terrorism  Laptop theft  ID Theft  Litigation & Regulatory Risk  HIPAA, GLB, CA 1386
  • 27. INFORMATION SECURITY BODIES, STANDARDS & PRIVACY LAWS  Standards & Privacy Laws  British Standards (ISO 17799)  EU Data Protection Act of 1998 (DPA)  Health Insurance Portability and Accountability Act (HIPAA)  Fair Credit Reporting Act (FCRA)  National Institute for Standards & Technology (www.NIST.gov):  Founded in 1901, NIST is a non-regulatory federal agency within the U.S. Commerce Department's Technology Administration.  NIST's mission is to develop and promote measurements, standards, and technology to enhance productivity, facilitate trade, and improve the quality of life.  Computer Emergency Response Team www.cert.org:  The CERT® Coordination Center (CERT/CC) is a center of Internet security expertise at the Software Engineering Institute, a federally funded research and development center operated by Carnegie Mellon University.
  • 29. Privacy Governance Architecture Process Process Opt/in/out Opt/in/out Security/Pr Security/Pr Organization ivacy Organization ivacy Compliance Policy Policy Technology Regulatory Regulatory Technology Requirement Requirement People People Planning and Program Metrics Strategy Program Maturity • •Privacy Strategy • •Privacy Risk Assessments • •External Support Infrastructure Privacy Strategy Privacy Risk Assessments External Support Infrastructure • •Data Classification Analysis • •Data Governance • •Privacy Auditing Data Classification Analysis Data Governance Privacy Auditing • •Privacy Teams • •Vendor Governance • •Incident Response Privacy Teams Vendor Governance Incident Response • •Policy Development • •Technology Planning • •Crisis Management Policy Development Technology Planning Crisis Management • •Policy Update Plans • •Business Process Review • •Knowledge Management Policy Update Plans Business Process Review Knowledge Management • Decision Management • Information Security • •Consumer Support Infrastructure • Decision Management • Information Security Consumer Support Infrastructure • •Privacy Support Architecture • •Information Privacy • •Open Source Intelligence Privacy Support Architecture Information Privacy Open Source Intelligence • •Awareness Awareness
  • 30. HIGH LEVEL OVERVIEW - Notify client - Notify regulators - Remediate - Analyze long - Detect Incident term effects Resolution & - Identify source of Detection identified - Analyze lessons Reporting learned -Log incident - Reduce false positive Privacy - Determine scope - Assemble Response Digital Incident Assessment Team - Collect & sort facts Response Forensics Process - Engage digital forensics process - Determine - Collect evidence scope - Engage 3rd party Containment Analysis - Assemble Response Team - Collect & sort -Technology containment facts - Process containment - Procedure containment
  • 31. Information Security & Privacy Risk Management
  • 32. RISK MITIGATION  100% Risk Mitigation and not 100 % control  Good Information Management Infrastructure that  Provides modular core set of controls  Supports existing, infrastructures and new applications Policies,  Incorporates policy and standards, people, process, People Standards & and technology Guidelines  Provides a horizontal and vertical risk SELF or AUTOMATIC assessment program Equilibrium  Provides collaborative issues resolution system Point  Balanced Information Management Infrastructure (IMI)  Risk Mitigation  Vertical – up and down controls in branches and business units  Horizontal – policies, best practices, processes and Information priorities across the organization Technology
  • 33. RISK MANAGEMENT METHODOLOGY Risk Assessment Risk Tolerance Organizational Dynamics Point of Balance Key Risk Indicator Risk Takers
  • 34. Key Risk Indicators Asset Value Stakeholders Pen Testing Site Reviews Vendor Audit Reviews Regulatory Compliance Self Security Loss Amount/ROI Assessment & Privacy Incidents Business Impact Risk Evaluation Model Risk Rating
  • 36. DEMAND – BASED ON GARTNER STUDIES  General IT staff outsourcing has gone up 24% since US recession was over  Growth in IT staff augmentation will be limited and in single digits  Security outsourcing is trending up  Identity management  Vulnerability Assessment  Operations  Firewall management, anti virus and IDS
  • 37. INFOSEC PEOPLE  Typical jobs for contract  Business Intelligence  Business Analysis  Risk Management  Information Security Officer  Information Privacy Officer  Digital Forensics Experts  Job seeker support to help professionals identify new career opportunities when they are unemployed or contingency searching due to circumstances at their workplace;  Contractor placement to help independent contractors identify and secure short and long term contract work based on hourly rates; and  Corporate candidate search to help clients identify candidates for new or vacant positions, as well as contingency searching to stage replacement of human resources
  • 38. TYPES OF RECRUITING  Contract & Temporary – constant spread based  Profit margins are small  Limited  Hourly, weekly monthly  Permanent – one time commission based  Entry levels  Mid levels  Management, Technical, Operations, Design & Architecture  Outsourcing – profit margins are high
  • 40. WHAT IS SOCIAL ENGINEERING  Social Engineering is the art and science of use to trick one or more human beings to do what an attackers wants them to do or to reveal information that compromises a target’s security.  Classic Social Engineering scams include, posing as a field service technician, calling an operator to reveal private information such as passwords and the like.  Social Engineering is an evolving art that uses the simplest and most creative schemes and involves minimal technical expertise
  • 42.
  • 43. Thank You Tel: +236 733 782 490 +263 773 796 365 +263 -4- 733 117 Eml: info@gis.co.zw cade@gis.co.zw Web: www.gis.co.zw

Hinweis der Redaktion

  1. The cyberwar strategy relies on hacking, virus writing, electronic snooping and plenty of good old-fashioned human spying. Much disruption can be unleashed over the Internet, but attackers first need to pry open electronic gates to private and secure networks with well-placed insiders, or at least inside knowledge, before they can be effective. Source: Far Eastern Economic Review , Copyright (c) 2001, Dow Jones & Company, Inc., Thursday, August 16, 2001, Innovation, Cyberwar, Combat on The Web; Charles Bickers in Tokyo
  2. Take some of the examples and put them in a concrete context. Probe participants what they’re doing currently to protect against some of the these methods. DO NOT GO INTO DETAIL IN THIS MODULE, WE COME BACK TO THIS LATER.
  3. The bullets are just examples of the three main motives. Be sure to exemplify most of them. Invite participants to come up with other motives and see if they fit into the three top categories. There’s no direct relationship between threats and motives, basically any mix is possible. However, the teen hackers are mostly hacking for personal motives. Criminals almost exclusively do it for economic gain.
  4. From an information management perspective, we divide the infrastructure into three distinct areas: Network – This is the communication infrastructure that carries traffic for e-commerce and can be internet based as well as private. This includes Wide Area, Local Area and Metro Area Network Storage Area Networks Wireless Networks Voice Networks Application – This logical structure includes all of the applications that are currently used to create efficiencies in the work place Operating System (OS) – This is the nucleus that makes both communication’s and application’s functions possible. This includes both client, server and mainframes: Mainframe UNIX MAC Windows X The security & privacy dimension of this model that need to be addressed any time data is accessed are the following Authentication – Confidentiality Access Controls Data Integrity Audit-ability Non-Repudiation Availability
  5. Detection – Incidents are detected from many sources such as People, Customer Service Desks, Audits, Alerts and Technology Trouble Tickets System. Assessment –. Determine scope & assemble Response Team members. Analysis – Classify an incident; determine actions and possible escalation requirements; and work with Response Team to determine actions. Containment – Activities designed to keep the incident from escalating in severity and limiting the number of affected clients. Forensics – When required identify, preserve, and analyze potential evidence. Resolution/Recover - Determine the extent of damage, the type of response needed, prepare necessary resolution statements (e.g. notification letter, inbound and outbound scripts). Evaluate if notification is necessary and then document lessons learned. It is at this stage where other major stakeholders maybe involved like Human Resources, OGC, Public Relations, Physical Security and Law Enforcement.