Chapter 1 Introduction To Security

Introduction To Security

Get Started. It's Free
or sign up with your email address
Rocket clouds
Chapter 1 Introduction To Security by Mind Map: Chapter 1 Introduction To Security

1. Goals of Security: Confidentiality; Integrity; Availability

1.1. Information security is intended to protect information that provides value to people and organizations.

1.1.1. There are three protections that must be extended over information: confidentiality, integrity, and availability or CIA:

1.2. Goal of Security:Confidentiality

1.2.1. Preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information.

1.2.1.1. It is important that only approved individuals are able to access important information.

1.2.1.1.1. For example, the credit card number used to make an online purchase must be kept secure and not made available to other parties.

1.3. Goal of Security:Availability

1.3.1. Keep data and resources available for authorized use, especially during emergencies or disasters

1.3.1.1. Denial of service (DoS) due to intentional attacks or because of undiscovered flaws in implementation

1.3.1.1.1. Loss of information system capabilities because of natural disasters (fires, floods, storms, or earthquakes) or human actions (bombs or strikes)

1.4. Goal of Security:Integrity

1.4.1. Keep data pure and trustworthy by protecting system data from intentional or accidental changes. Integrity models have three goals:

1.4.1.1. i.Prevent unauthorized users from making modifications to data or programs

1.4.1.1.1. ii.Prevent authorized users from making improper or unauthorized modifications

2. Types of Security Threats

2.1. A threat, in the context of computer security, refers to anything that has the potential to cause serious harm to a computer system.

2.1.1. A threat is something that may or may not happen, but has the potential to cause serious damage.

2.1.1.1. Threats can lead to attacks on computer systems, networks and more.

2.1.1.1.1. There are four primary classes of threats:

2.2. Unstructured Threats

2.2.1. Consist of mostly inexperienced individuals using easily available hacking tools such as shell scripts and password crackers.

2.2.1.1. Even unstructured threats that are only executed with the intent of testing and challenging a hacker’s skills can still do serious damage to a company.

2.2.1.1.1. Virus: A program capable of replicating with little or no user intervention, and the replicated programs also replicate.

2.3. Structured Threats

2.3.1. Structured threats come from hackers that are more highly motivated

2.3.1.1. These people know system vulnerabilities, and can understand

2.3.1.1.1. They understand, develop, and use sophisticated hacking techniques to penetrate unsuspecting businesses.

2.4. External Threats

2.4.1. can arise from individuals or organizations working outside of a company.

2.4.1.1. They do not have authorized access to the computer systems or network.

2.5. Internal Threats

2.5.1. Internal threats occur when someone has authorized access to the network with either an account on a server

2.5.1.1. This could be a disgruntled employee, an opportunistic employee, or an unhappy past employee whose access is still active.

3. Type of attacks to computer security

3.1. Physical – Events or attacks that steal, damage, or destroy equipment, such as servers, switches, and wiring

3.1.1. Data – Events or attacks that remove, corrupt, deny access to authorized users, allow access to unauthorized users

4. ACCESS TO DATA AND EQUIPMENT

4.1. Social Engineering

4.1.1. To protect against social engineering

4.1.1.1. Never give out a password.

4.1.1.1.1. Always ask for the ID of the unknown person.

4.2. Data Wiping

4.2.1. Hard drives should be fully erased (data wiped) to prevent the possibility of recovery using specialized software

4.2.1.1. Also known as secure erase is a software-based method of overwriting the data that aims to completely destroy all electronic data residing on a hard disk drive

4.2.1.1.1. Often performed on hard drives containing sensitive data that are considered confidential such as financial information

4.3. Hard Drive Destruction

4.3.1. Companies with sensitive data should always establish clear policies for hard drive disposal

4.3.1.1. Destroying the hard drive is the best option for companies with sensitive data

4.3.1.1.1. To fully ensure that data cannot be recovered from a hard drive, carefully shatter the platters with a hammer and safely dispose of the pieces

4.4. Hard Drive Recycling

4.4.1. Hard drives that do not contain sensitive data can be reformatted and used in other computers

4.4.1.1. Two types of formatting can be performed: -Standard Format -Low-level Format

5. PROTECTION AGAINST MALICIOUS SOFTWARE

5.1. Malware is malicious software that is installed on a computer without the knowledge or permission of the user

5.1.1. It may take several different anti-malware programs and multiple scans to completely remove all malicious software

5.1.1.1. It may take several different anti-malware programs and multiple scans to completely remove all malicious software

6. PROTECTION PHYSICAL EQUIPMENT

6.1. Physical security is as important as data security. Network infrastructure can be protected by:

6.1.1. i.Secured telecommunications rooms, equipment cabinets, and cages

6.1.1.1. ii.Secured telecommunications rooms, equipment cabinets, and cages

6.1.1.1.1. Wireless detection for unauthorized access points

6.2. Another method of hardware security is to disable the AutoRun feature of the operating system

7. Security Hardware

7.1. There are several methods of physically protecting computer equipment:

7.1.1. Use cable locks with equipment

7.1.1.1. Keep telecommunication rooms locked

7.1.1.1.1. Fit equipment with security screws

7.2. For access to facilities, there are several means of protection:

7.2.1. Card keys that store user data, including level of access

7.2.1.1. Card keys that store user data, including level of access

7.2.1.1.1. Sensors, such as RFID tags, to monitor equipment