You are on page 1of 46
of toformation and tnfosmatior unauthorized access use 4 dissuptt safety ond privacy of * August KesckhoFf *Bob Thomas — the Paincples ¢ (Goals) urthout prope” accessing data. that people ited f¥om BeEEieans, that: only authorized. sodividuals [system Can View Sensitive os classified iofevmation. The dat, O Arathab being Sent over the etwovk shouldnot be access le ‘ead by unauthorized individuals. The attackers may ty, q systems captuxe data using different tools a 27 Titty | 7 and gato access to yous tofownation. A primary wry = a to avoid this iS to USe enctyptton techniques 4, 9 oy Sofeguaxd yous datayso that even ?f attacker gains an: : , access te your datayhelshe tll oot be able to applicat decaypt tt. when Specific Integrity > Totegsity means that data cannot be | they 0 Modifred without authortzatton. Cossuption of data ts.) an inc failure to maintain data ‘integuity. Zt involves measure Maintaining accusacy and. Completeness of data. Data Secust cannot be edited tm an eunauthostzed, @aye The integutty of data %5 maintatned only tf the data x Secusits authentte ,accusate and, veltable. Data. must aot be | mechan changed to tvansityand Steps must be taken to @ Auth ensure data cannot be altered by Unauthosiza oy i Tt means that the cetwork Shoula m- The a j Piles. J be xeadtly available tortts usess-Tt oppltes to may ty «| systems and to data. The tnfosmation should be ; co Titer consistently and eadsly accessible fos authosized Pravymcdhy. Miumeecec: Wolves GEREa matotaising hoxdware Pepe sirte and technical infrasttucture and systems that hold] Fgains and display the information. Systems Networks & ble to applications must be functioning 25 they Should and when they should Tadguiduals atth access * GeGPe takematiano.musi bes dhl, #9 eae ae eae anot be they need to 4 getting to the data should oot take data. ts. ] an inordgnate amount of time.We use preventive ie Peeiases suck Ss eiundeny Toll ct = Security seices tenplement Secust Sewices 2 ways The | SS s and axe implemented by Secustty secusity polt e data is not be mechanisms. ast G) ne thentication —S Its Se comneae we nena “ ee Bi atte autheotice Lts Nene Ioc as to a eae mechemmmigs> t= 8S ftom agsuse the seciprent entended ~ Source . Tt provides commynicating entity ts the one to be. Peer Entrty Authentication of the peer entities tnvolve essusance that» the that tt claims — Verifies the “identities eet, Cor MUNCAtVOMs establishmed Lo” see end, cluxing data transmission. Liat) alle Frovides use at a tome 6f condéctton Data Origen Authentteatton Assumes the authertreys of F data untty but Ptotee against duplteatton ov modifica dato. Umnt,, Tt $8 an see that Source of tofoImatton _ Vert Pred. ® Access Control “the pstrciple of access Ckntdell dectdes who should ‘be’ “capables +On=eaaaE ¢ the Notdang Gupposts th Widance « tnfoumattor terns Tt Bousces THiS SesVice Cony unauthos ized of a veso! is o,f to a segource »undey what who can have can occu¥ and whot those ae ce5ti9| to dow Conditions access the vesousce ove allowed @ Data Confidenttaltty > The pwtection of data From, unauthorized disclosuve. TE defines that only the sender and the intended vecsptent should be capable to create the clement of the message. Tt 95 also protectton of data ftom passive attach Connection Confidentiality — Psstectton of all user data on a connection Connecttonless Confidentrality — Protection of all User data tm a Single data block Traffic flow Confidenttaltty —The protection of te tofosmatton that might be dlevived from obsesvatio @ato Int tecewed % entity. TH modsftcattor Connection | fettegrity detects a, of dota recovery Connection ae Single « fos of oF ep Selective the rates Once takes 4 Selected played. Selectrve the ante Connectto determe been 0 of traffic flows. Selective Field Confidential tdentialty ——The confedectiality of selectiel Sekcted fields «atthto et uses ee fn _a_ Single data block. ElatGe BA) & . connection? © Connect? for th Connection Integrity with Recovery — F connectton 4 xeplay oF seplag Selective field connection Integy? of selected fee eee connect ‘on! determination of ted, been mods Connectten Tntegrtty utthout Recover y— i t without ONeo Reputation > Te protects Gh the entities towed 4] against dental by on ; : ; poivents etther Sermey o¥ ue Beco caicctione pas transmitted message, Non ~epudtation ,Ostgin 2 Proof that message Was Sent by the spectfied pasty Non xepudiatten , Destination: Proof Eee ada secewved by the Trfoxnation Securtty? Providing securtty to the Somputey system , network ond data- ) Authentication — Raxticipants should be authosized. o Single Message — It tovolves just one Pasttcipant. Sender usually Sends the message and thete 1S 10 Need of the sponse of the Yeceiwverss 6 Wasning Alasms ,Five fllaims ete «Doped Tntevaction — Tt takes phce between more thay ex system. Tt foVolves 2 phases ~ ) The Sendes and Receives should. paove thets authenticate and the connection shoull be eStablished. 1) These two devices shouldnot act a5 tntvuder afte ox provides tote. |e These ame tb %.800 & Peer Entity A xecewes from denying prove thes Data Oy ever though oF Communi specified caste 2K Authentteatt by providin Secusity ase divide, Specific Specific + # X-900 and {deve Reversible an encry, enceypted Lsreversibl hash al htch ax authentte establishment. Connection eine ea ciphesne Reverstble Enetpherment Mechanism > Tt data Tereersible Encighesment Mechanism —> authentication codes, and message ¥ The secustty mechanisms that ase troplemented @ gectfic layes ase called Speetfte Securerty, Mec, % The mechanisms that ate not spectfic +0, ony called Pewasive Secusrty message of a Pasticuler protocol layer axe oe Mechanism. ae OSpectfte Sceurtly Mlechantsm? These ae trcospowted | using pint into the cpptopstate protocol layer in .order to PIO) canatuse. some of the SI Secustty Setveces. ARDigntel Sy % The diffesest appsoaches ave — ee HEnctphesment —> This mechanism deals wtth hiding | Public key « and coveriog of cate chich helps data to become © | digest. confidential. * The xece’ %Te ts achieved by applying mathematical calculations ,) ™**°°4 ahostthms which veconstsuct tfosmation snto con-veadull & The mes fox. the * The transformation and. subsequent Feroesy of deta me ssa ; Sigoature) « depend on an algosith and zero of more encayption ati Bi Access « H TE tovelves Enewyption and, Decsyption. Enewyption, 1 | oe t6 an analytical approney, whteh Valtdotes dhe authentterty anal ‘tikeparty of a massage oF application, fe Securtys : SITIES TW Message 18 computed by. agplyiog hash function on the message ,tht message digest 15 encrypted. ncospowatedt | using private key of sendex to fown the digrtal ey to Pov. | stnatuve« Kpigttal Sipratuse 6 LYansmitted cotthid ng eksaag - je using the Recetver clecwysts the digital synakuse Sing bn th hiding | Mblte key & Sender, Recerver maw has , the message ccome a. eee ¥ The wcetver can compute the message digest From ¥ the message (Actual message 15 Sent arth digrtal Stgncctuse) vleulations gy) Men-readable) * The message digest computed by veceiver and the message digest (got | by ceewyption on digrtal F data Signature) needs +o be same fos ensusing totegrity encryption Fi] Access Contyel —> A Vestety of mechanisms that enfovce access vwights to vesources. tion. $5 ey text. |¥ Tt. $5 used to Stop unattended access to data es text | that is being Sent. ® TL can be achteved by Using Vatious techniques Such aS opplying passucids, Ustog fixe call ox by adding PIN to data, ildute otepnty — Th vertety of mechantins ua Res eee Coss or stre, Bt assure the integsity of a de Ske, Bcf dota uotts- * To aSsuve that messages ton , modificat are, recened OF Shot y Peery ron veordesing oF xe, Ary Sune teation ,insext no duplteatton nse mechantsooe 5 A mechantsm totended 4, Bi] Authentteatton Exchan; a Fl Sccusity Seer aeisey is tly by “means 6 acs : els assc fnfosmation exchange- TE IS ne Troffic Rdding —5 The tosextton of bits toto label coith in a data Stream to fsust¥ate tyaf fie analysts *A Secusst with the attempts. [Fi] Routing Gntwol —5 Enables selection of pavticulay | Pilevent D Physically secuse wautes fer cevtain data. and allowing | events tc Bourttng charges >hen a. bseach of security t Suspected, of 4a Fosma! Seer, GFT] Notastzation —s The use of a tsusted thred part Wi Secusrt Fan tadegs to assuxe cestain propesties of a data exchange. Secovds i Ofesvasive Secusity Mechanism? The mechanisms that controls , ase not spectfte to any particulas OST Secussty any ind: BSecusity used to Sesvice 0% protocol layers % The di ffevert mechansems aves nantsms, seg li sted. ic " mas Gl Trusted Functionality They may be used to ext t or stze, oy [the scope,os 40 establish the effectiveness oF othe os fe tate esto 1 OF Kp secusity mechanisms- Any Functionality cbecb provides access to secusity Fmechantsens should be trustaosthy. [Security Label y system xesources may Move secustty intended tg ns of lobele assosctated uith them NTE ts cecessary to covey the appyopriate secuvity 5 tnto 7359 label cttl data im ttansit. E nalysts nn secusity Label may be addattonal date assesciated Be ee cnta, tons fewsell « saxticulay || MilEveat Detection —> Detection of secunty -*levarst } allowing “Stents focluding Fosgesy rdental oF Sending o¥ ~ecerving JT 5 Suspected. ie 4a format? on, mods fication of tofowmatton et< ; | Res Tcl A seity wast eters we PH a todependent seview and €Xaminetion of system ae ‘Ranges | secords and actwittes to test tov adequacy of systen, eonteolsyto detect byeaches 19 Securtty £ to recommend! » ms that | currty lany todeated changes fn coritsolspolicy 4 proceduves. | Security Audst. Total aefexs to dota collected ¢ patent ally used to facilitate o security audit. (USecustty Recovery —yTt requests te deals ot | Seysests fom mechantsens Such aS evect head|t0g 4 management functions ¢ takes secovesy the result of applying a Set of wales. rth actions aS ty Model t ] Netwosk 50,0 trnteh ty take the | etpena Secustty Model exhibtts haw -the Secu! ween designed eves the nettionk to prevel ToFormatton ty bet to the to % One must ons the Secustty maf cepenent from causing a threat otiality ox authenticity of the toformatton thal transfesxed. +hrvough the network. berog 4+ An oppsnpsiats Sender < if Receives opptop stat rene 1 re Message ee, ead : Hs | Such thot 1 | to Crack that mes Tnfermatton 1 ® Chancel 2 Os a3 i 2B | secuee | SP | 2+ & bey emus gs 9 2 |dafermatton SH B= Bz Printed = |) This secret to a secusity algos f a “rusted eae Fost 3.Secxet Info | sendet’s end,y *The ne osk Security model presents 80 communteatin, Parties sendey €vecewer ho mutually agrees £6 share of “we Oe J exchange the information, used +o dec e pen Fos. * + cannst Send. the message on informatie, stl - #20 oeimation chao ae to readable fosm as it atll have a threat of betng a 4 a ao attacked by the epronent. Anstutbut! | ecewer- ¥* So, befoxe Sending the message thyough the channel, st | i 5 desi should be tansfosmed tote an unseadable fosmat, je de methods % Secret Infoxmation used, while icosfexmiog a message which will also be wequixel when the Message be vigetsansfomed at the sectptest side, | Becewer- c An appa a Sectet the tater *S0,e trusted thrid. party ts! yequiel NOM Be, esponstbiltty of distetbuting this towelved communteatasn Secwet | “Sty ke the 3 ve tal P'S VecRall testes to both the parttes the a One ee following tasks bile sin consider the mation 4p a SSH the Secustty mode(s receives 4+ An appropriate alpostthm should be destgred to transfos,| — The “Teodabla message of gener le At readable pn Poel f Such that 1 SE ee “LiFe ult fox, ane 4 fo Crack that secustty algostthen, (+> & vet | SUM. A pees Generated. hich. hs sete Tofoomat a cae This Secset toformation tg used TO confunctton arth the transform the message. > | Secusity olportthm tn oxdey to | Secret ina dee equtsed at both the ends, At | | Sender's end yt ts used to encrypt ov t8aqsfom the Un Fearkin, J | ey * Message toto Unseadable form # at Yeceivews endyet ‘? ‘into readable Shas. a i Used to decaypt 0% vetsansfoxm the mes ag fosm. ch etl must be a tvusted third party cht a distetbute the secret ‘information ty both sendex £ | ¥ecewer. | nel, rt * The designer must Conceritzate on dleveloping ee Methods to disterbute the key to the senolex ¢ re; Vecewere “An appropstate mathodology must be used to deliver the on to the communicating pasties wtthout of the cpponent- age Seetet tn fosmaty, the totesference pe Tt 5 taken core that commer used by communicating poattes should be Suppowt;, | b)Seavice The Pate dyactom othe © Ser key to oxdex 4, | accessing sesvice ee webteve _ the Secuvi ty Boxms gis Netwoxk ec #1 ts designed to the tnfarmation System a Secuse attackers thsough the neti can be accessed by the Pe peetbers vere > tadically |of 2 tyres? | 4.Hockes—> The one who 45 only toterested %9 penet,, anto ous system. They donet cause ang hawm to yous system sthey onl, get satisfied by getting access to gous system. D To ints 2. IntrudesS > These attackers tatend to do damag, ed Reepes fur to Sy Ste ce te tat * C qour System or try to ebtato the infoumation fiom) hrc wx the system «which can be used to atta Firancral a 2) By tots * The attacker can place a logical progsam on goes vowanted, Sy Stern thsougl the netuosk whtch can affect the Syste Software on gour system. eit is System | the con ye leads +o uo inds of wsks: 9) Information Thseat—> These threats mod:fres Ba on the asev’s behalf to which actually user shoul Mot accesse p) Sesvice Th £5 This threat disables the uses, From Appor ting dota on the Powder ¥ accessing + These Hinds of +thyeats con be duced by launching attack s. ase Softw Bosms gvisusese Th Tafatmation System Conputing #esousces Mernosy 110) Opponent Haman (Eq2Hecken Fes) Beeaare (Ege Visis:. Informatie Woxms) Chonne| Gatekeeper Function tus ways to Secute System From BN, aelaracpes fusctid Ttrelucry 9 logtg -td & tion means tntsoducing iL cep Quay the unwanted ace. we instal! on oux user From acces. Agency [zal * Counter abewvorist task fo, the prtmasy of India. with the tavestigation * Tk is eenpowered to deal cotthout Lessor elated crimes across states state S- Special pesmtsston ftom the TEE cesks ley the Munstay of Home At Standosds. | * OF ficexs of * The agency came sate existence atth the enactm,,| Fae 2008 | 4 ct of the Nectanal Investigation Agency A ey the Rawhament of dndta on 34, December 2008, | Giese rascals after the cleadly 26/12 tewtor | A state powets + hand oves Prnided « otteck ¢a Mumba. *Such an attack tevealed the fatlte of totelltgence a the sched! Pabilsty to tvack such activities by existing d agencies % Tndta,hence the GStoveshmest of India’ * Centio realized the need of @ Specific body to deal exith | fovestigat ( tessos related act? NZA. eS eaDeeelod ia, establishing tt] es Headquastes 1 ate heoeewDel bt. KE NIA has btanches tr Hydesabad.y Grucoahates, Kec Lucknow, Mumbat Kolkata. Raipus, Jammu, Chandigaxh Ranchi, Chennai 4 Imphal. Bemave © ofcess Disector General of NTA coo } *€ Cussertly, Dinkax Gupta serves oS 4 | Gienetal- |¥ The Agency aims to be tovestigative agency match standasds. * Officers of the NIA cho axe dawn fo , enactment Indian Police Sewice €Indian Re 2003 4 all powers # psivileges atth investi; 2008, the centsal Ge texsox *A state Govt may wepuest sf case to Ree tte mrouestrection fs. 5°). ° segistere d Provided cose has beer Eres ntelligence schedule to the & Gotial Gort com osder NIA to take over of ony ScedmledwaotncOSey 240 fnvestigat ton an Todtae Attacks = HA attack 38 an tnfosmatton secusity to obtain altes, destroy, threo that involves om attempt wtthout authorized Semove oF 3eVeal sfosmation e Teleport Telectsonte mail message jos a tans fered eos confidential information. cortterit ssoge which Bob Alice Daxth 5 1) Daxth obsexves the | Pattern of messag exchanges _beteeen/” Bib «Alice ‘ Cae date 4 late ae Attacks! * Once the eABavenAreeceS types ote — funsofe fos { DMasquerade > A crasquetade attack takes place on _ | one entity pretends to be o different entity. | A masquerade attack 15 on attack that uses ai| l tdentrty 4 gain uneuthestzed access. | [Bo = TF an authowzation prcedute tSmt absolutely protect, ts extremely vulnewble to a masquesade attace. | 4 These may be pesformed using the stolen passionrd| logins,corth the aid aa Sy) Finding gaps in Proper * The amount of access maspuerade attackers get dere, en the level of authorization they have mange Sell access to Darth pretends t | oHetIg detwork Y Replay —> Tt involves the fa Bits Subsequent tvansmissien to produce an we captete of. mec, Sopa authostzed effect. ice H The atm oF the attache, 15 to Se a cory of thy data ovtginally present on Ht pavticular retwosk | 4 lates on use this data fos pessonal uses. *Once’ the data 5 cossupted ox leaked tt 15 unsecure funsofe fox the usexs. Daxth Tk mans that seme olen passwords | Portion of a message 1 altered oy that message is pS programs delayed ox reordered to produce an unauthoxt zed. effect. Gt* depends raged eae TE means that unauthorized pasties not, only goin, RRC access to dota but also Spoof the data Such as altewing t¥onsmitted data packets or flooding the Oetwork with fake data. a ends to Daxth | Fr \Medifies the message + ___ \ Altce —_— I, aad TF Geb --——_Cinteeinet SS iA 4) Dental of Sesvice S TE prevents the nowmal oF communication facilities Tt may have a specs target. [ ¥ An entity may Suppsess all messages directed. to Paxttculas destination. ¥ Dismptten of an enttve network etther by disati,| the network ey by vesloading tt atth messages s. as to degrade pexfownance. [Bea Otten the sewer by , tying false Fequest | ¥eSults tr - application 2 Zeteet {Altce | * Tt te authos' zat 9) Repadiation 5 Tt occurs chen the ee completely Secured os the btn conteol has be Bresso en tone © Explorts ¥ Authors infomation an be changed. by actions of « Bs maleteus uses 2 ordex to Save false dota tn kg . een hee out Se ne Active Attecks Fihweat of | [esnfidant al ty | Avaslo-brlrt Secu: ts any action(inctdent that access +0 computes data, to iofoxenatten being accessed without an totsuder fs able +g Types of _Secustty Breaches ¢ Oéxploris 5 M9 explore attacks a System vulnesability of date opexcting system, Such aS an out * Systems ahace hanectt, been ,aphated NEE Wy Reine of Micsosoft Windows that Whee outdated £ vesstons te used ,these are ate no hnger Supported ate be tog Valnetable te explorts. J) raticulasly l they can be ciacked os 9... @ Weak Fasswords > TY ecg. too “YW gon use the anal 1 a long rested o e not charged f ee phishing endl] ko ene aces © Malware Attacks —> These er. ak pesson to click om & tink ae ales one PE * he It only tal lretous SFE exe to 5p 4 EabtRgcernatlina > oe ae | rassuod ut : networks spseadiog though “De @ Change th s edu wonhads > Use visuses °% mallsase dela | cha OveveREEDe ot Compromnitsed website. [ thsough 2 spoofed Odes ace a them” undis teas al be ce i @ Social Engineering —> Te con alto be sed £0. jam | secuntty access. | *IF qou d IN eee rGe call salen employee cloiming to be From te that it hi cempary’s IT helpdesk £ asks fox th. password tm eS a back oxdes to fx the computers Ol pe How to peotect youself from a Secussti breach:| Psopexly es ¢ 4 \y @ Use _Stsong Passwords —s, Passwords must be St¥0q, te Th cotta ohich sombine tandem stxt oF upper & lowed case lettexs,oumnbess ¢ Symbols. ¥ Creating ail also c % They ete much move difficult to csack than simple Passwosds, © Sets backup on tm the Doct use passiords thay 2 e054 to guess, (the family ames of bisthdays, se erent passwords on. tf ferent © Change @Close accounts you doctt Use Father than leaving them undisturbed > It +e. [OTF gor thiow out a computer, wipe the old hard dive 4 a. destruction! breach: | Propesly > Doct Gust delete use | P09g%am wipe the clave canpletely ovesostting all | the dato disk. installation of the Opesating System the dive completely. fy Bi backup on a Bemovable drive »So that datn ts Sofe iD the event of © a bseach. st, “ee | Use a seveen lock € ip vii © Secure your phone —> Use de Aq identity 4} | Yous phone's software vegulaly. Fowgotten the account ® Know the va % Dott oot oF jatl break yout phone. of hackess the orpustunsty 4, Rooting a devices gues j Sead ge ox disclose 4 to charge the sete, 4 oan Software fostall +h neces sony. en yout phone. * Keep the cet @ Secure yous computer father devices by 4sing ant Secused. Tafoxmation ood. choice to beep the computer Free From infec # ensuse that hackevs cant get access to the sal € The tem | the dosage @ Be careful where you click —> Unsolterted, eral ul ( nae | couse. sites mat ah | ude Hoks to websites may be phishing attempts, Peet ce eee * =f they: include abtnchmentailegs (neem they of assets 4 Fenuine before qo oP eon thermeeetr seme nmentes Ving Al reonacy on attachments. @ Whee forse acce$Sing Yous accountsmake suse fou'se using the Secuve HTTPS—> We must use HT7PS protocol ¢ oot just HTTP, OMoortosing your bank Statements €csedit repouts hel Hes Keeps assole ESTEE len datiocany. dues ap the desk seb years after the original data breach ERisk sss. * Wosstes Pooguess ¢ kee Dose! the Setts, | ave os disclose yous personal data out Uniee® necessasy. ¥ Keep the cctwosk access £ personal data tightly secured. rUS 1S a Tofoxmation Secusrty Rist 2 ‘om, iofecua ” ¥The tein “Tnfownatton Secustty Risk" xefers to the damage that attacks against IT s45tems can ich} couse. Le Matas Fish, potential fox [oss,damage os destvuction to the Syst, mails wh xe theyae of assets ox data. tt ~vPrus | Risk ts Somethicg ahtch may of may oot harpen. ¥Woseres about. security isk can often» Slow Suse@ Proguess tkeep companies f¥om eneeting thet goals. use Tafosmation Secustty Risk Assessmecit—S A successful Cyex Secusity steckegy stayts with a visk assessmer ea ¥* The Steps tovolved ta Tnfosmatton Security Risk > ap | Assessment axes J “on 2s U4 ei cama tdecttfying every Secu, ify —> Start by coaae“? | 8) Moss of tng o¥ could | —— cussently focing “isk Your Company 15 oUt ‘a | change 05 4 ox futuse. ee es, Feasonally face to the re same oly #50 mentors As ach Sisk and. determine 2) Avalyze —> Examine ¢ he. —— \ of of cceussing + patents 4 tkelthood, sf the same amg Foltctes , proc tsk oll sequtse the same amouct Not every sts aatll seqe peices Fc: attention. re These axe | Risk Analysts helps foe to psiowitize the visks | Should. that have lasgest potential fos harm. | sisk 3) Prevent —> Once qou undesstand the -yisks [oll ceed +o develop controls 4 procedures the — most > fou) to ey| Accept > the demage (6%) prevent +t altogethe, Minimize * It may Povolve seating poltetes fesocedures | * Risk Re | Vents tha es allgostt 1) Document Cease clocumentatnon aa ike, (Sees all the +: all sesve gow well long team. ¥ Creating = BSk segister with gour + conteals utll keep an actior Sisks,asstanme| 't eiergone on the same page 4 2) Shaxe [Te with on < Transfer - © Here; you Mingmize confust fon £ miscommunication. ¥ Documentakton all help as sevisit ous pokcres the psajec € sevise them ar change tS oeeded a the futut Insusance | 2) Monttex ond Reassess > Secusity sists as the business opetations evolves ox change new technologies emexge #69 monitor the success of yous Secunty efforts, Me both, t. Beassess your x1skS pesiodically 4 adjust goux Bmourrt Foltctes, ptoceduses + comttols as necessary lapses ef Rist Response > Bee. ees ee rere, teres, of seoronses ond. os Bheuld assess information systems as “ell a5 each Fisk fodividually to determine hich approach rll be ce em) oS Se cee, 40 cvt),,| VAceept—> Tk undesstands that a Anathes st¥ategy ts to Share ~isk with an outside contracts. 0% paxtnet+ acc. eS ae sesalvng Mn de Geaqee. sick to vaunted = pasty Buch as buying eres Fetuse- fnsutances et sisks you just cart | 3 Mitigate > Some psaje ees abies 12 “educteg th | nauthont Whose you eed to mitigate, sisk Sofect. ‘ i Fi csativs of the proje. the otgonizat Impact © Ack to seduce the Biobabttteg of cccutence oy 2) Mentos Yous ty Secusity fo tmpact PAvord > Tt ts genesally the sofest of i 282k. em ocere Been cern oye oe ime by any means [PTE ar men changing yous prefect management rh to avoid the vt: ¥ gi Cancelling the project | EE Fonelies deve locing 2m) climsoae Setategy tot tS) 3c tence C move likely to succeedybut 18 linked to a bighes e Tnfoxmatton Secusity Risk Management Best Pxactt | Flextble £ will fold thseak Ss | ¥ Te provide protection against cybes threats ,you «tll ic Peed 40 embed, x16 management into your Company t| Su*vounding every levele * Adjusting will ensure ) Educate yous StaffaS state axe the fest 4 best defense against Providing strongest Sptem will sequtve conststent at created during FS assessment sill be assusing that Security policy 15 up t, Regrstes (A Irst of wists) will assist with “¢mate suxe that all isk axe covve ¢ ange ONES time 05 new thseatS eme. come tedundant- pou FEMS Sevise the pol heh xt Ss at least annual ig fojects (progsam) to Baiec tte against | Cees) Se ustty “Threats? A secusity thyect 1s a mal, eT ter ou | seseoding the act (tllegal/unwanted) that aims to cesupt ox of pesmi * Ore p % Creeper % Gye File Visu organization 948HEMS Entry, the date.» dissupting organization. * Théeats axe F Software attacks a Theft of tdentity + Theft of intellectual property Te Theft of} eyapment [infomation S Sabotage | + Extortion | | | *Wosms tke xemeining ac [ © Scftuase Attacks —y These ase after segasded os | * Worms ase Maloese(Malteious Softesoné] wong ene compute % Ma loaxe bastcally means malictous softunye that can i] On. the + dam intsustve psogram code oF angthng that 1S desip, for exemple} to pesform malicious epesattons on sytem. ia an ies Pep ce +e ) Trojan — % Malwaxe con be divided into 2 calegosies : + Infection Methods Actions “Rojan 4 + Maloase aes haa) Giseek: Pv ised Malar basis of Tnfecttor Method > Visus- A vnus ts 2 nokeious code that “sepltcates howse gh b ar ¢ fod of owes 4€8usted y I Trojans wxte Verd n 4 the Soldress emerged wttnet, Malwate blindly. Zo the oth 1) Adwaxe - © th 2 ey executed , they : todiutdual erty Flom the mnside conceal themselves ins; to % Ther puspose © Z softwave s | softwase » dhen thet Wieiy tock (cf Cia stasling (ote! oom meee wi ts , "| Nal x : ioc Obie they en es Sam aoa Shel ques #Adisose cs backdeot gateway fF malictous oe | ow, ¢ i cory Dace fase 07 comput % They provide I] J to ettee system 4 sted!) your valuable torte Guy Yous knowledge 4 pesmisston« 1) Bots — They axe automated processes that axe tokerested, | * designed to toteract vey tntesnet without the nal se One ae fos human toteraction- Keylogger. * ae Mlictous bot can tofect one hastyaftex qofectiny 4| “The bas dor ell keystsotes te eseate connection to the centsal Sewer ahh Wee uses: @rll provide commands to all ‘fected hosts tact Fto thot netusk called Botrmet. | *) Ransom. etthes ee Rub font , Gees cstminals who control these botnets use +: Males, + tng tt to s p ‘0 Send emarl SPamsengage tn, click fraud comp] + 7] ‘ ean he a + genevate tralfec foe dental al Fsewice attacks. te FAN Sory * The van foe Stith Caste Maleate on basis F Actions —5 ) Adwase — They bseach psivacy of the users, eS Inside 6 * They isplay, ads on a Computer's desktop ov tstde ted , they fodividual pugvars. tmation ox * They come attached nth free to use software. lesigned | They onitos your interests ¢display elevant ads. fee FAdwase can monitor gout system activities + can Prep Wen fomptomise yous enachine. ata ony MEW *) Seysiaxe ASoftwase that monrtors your activitres ©N computers 4 %eVvea| collected formation to a5 at axe totesested party. OPE re cock comctin, example oF pyeouie 15 Keyloggey. fecting st * The basic job of keylogger ts to wecovd the user oan Feystéokes wrth timestarnp Tt captuves infosrnatio, Es. atthe) Whe Usesname, Passuosds ,ctedit card details ete Tt) Ransomuase TL ts a type cf malware that ul @rthes encsypt your files ox lack goux computer use then Making it traccessible either pastially ox ‘holly. cameo” |S Thepmeemmecreen call ce displayed asking for money aes Son a exchange « oe atl 40 1 masquesades Uy) Scasewase — Tt i? i ) eS a Yen the software 98 Keats dy} © Theft y system be cs S your Sy none ct completely destroy WL ce satellectual furl afect your Ye™ c ‘ll i a nessage to Fite py a oe * The softuare i actton Itke Pay the, to | © Theft cf ‘ ake +4 force to + 4tansfex or St tofotmaktion . g — They ae designed “0 J oct Zt means to acts 4 else 45 obtaty pesson’s _ personal £1 foformation oy 4} * 2&cesS tte! tn formattor, they have. + TE may be MMOTMMECSA cede, arcount of « Ag explort account by using thers b] ox ig Seqres & Nulmevabsls Fe unaut| © Theft of totellectual _pvopesty> “Et mnkans violate, ecutel destroy x4. | of totellectual property wiyhts Ike copyrghtssestants 9 hte, etc. Guise lines to 7... pe @ Theft of speneriti{torFenenoksocge= SL auue illegal Sythe wane "4 dental os Finance AMM > cuiteble we] dgans Fes oF Storage of personal cof? > Relation TASK 1 sofesmotton . Berea, tees ae“ accackdy’ these dey doe: €& mlrle . oe E nekuse of devices £ incteaSing information capaetty= PEST, |@Sebotoge ee eciecne sdestioyteg commend? aebsite Vate. cota | 40 cause loss Bem contidencesgy sbittS © Sustormess- @okormation extostten —» Te means theft of company bey one ; Poopesty oF soformation +2. secewve payment TO Foy the exchange. Be [fes[22] eamcone Exploits: Aa Exploit is a ptogiam,os piece Bier > oF t destaned. ko Fiod and toke advantage of secuxity fla] | os Wulnesabtltty tn an application Cae) Aq exploit 18 @ piece o& software ya chunk of data bety login of a seyuence of commands thet takes advertage ff os to (8 Nulnerabthty 40 couse Unirtended behaviour gato unauthoszed access +0 sensitive dota. Types of Exel ‘it oF configu, , a 2) Herdisave exploits —9 Poor encryption lack Fiat Water e cores. valoesabrlrty | | the vattous ap management frarmsase | £ ety Vtolettons, I...) * If fos: 2) Softinse explotts > Memory safety v an auto updates Nalidatton exsoss),pstvilege -confuston bugs; *ace condit:,.| ° attacks £uSe¥ interface f,, | ta the backgo Side channel attacks,tt BNetwork explorts > %IF ce use Unencsypted channel,then these 15 2 chan, to steal data. IF the opponent ts these in channel, tt Degtade you safosmation. Z Z he testes to exttact the informatio appltcation &¢ # Voencaypted communteation lines »man—in-the -eniddle Supporting 1 [attacks domain hijacking typosquatting, poos netwok sec, Sagi ie * Moke sux Domain hijacking ¢ Intsudey or opponent bijacktog the | lack of authentication, ov default passwords. ASO, Up fofoxsmation fox +thety own purpose. | lack of authestication? TF these | 48 m0 ptopex | 3 Stay sof authersteatton then angene can cossupt the acts. | oF Groogle byou a IO elterst =Sesver—envtson men a x | ) Cher explorts > Occurs — — ) Pessonnel “explorts —> Foos FeeBuiting policy ¢ process, uci | * Yous bee of Secusity auavenesS teaining poor password. onanagen the black Steey you ox falling for common Soc tal engioeesing. attacks. cae d DPrysiel site eiplttS —S Peon physteal cecussty, of keyeard. access Contyo(, Protecting System A Stay up-to-date —> Regularly apdate the 0: | the Vexfous applications, we have inStalleds " nto your SoFtuare Settings 4 Stn so thest updates happen automatically ta the backgsound without any catia effet en Yous excsiminals prey on People coho forget ov deck tne to update 4 patch thers software. becomes 5 Supporting teyahtch melas eng. eddsttonal bugs cot be faxed. ose discovesed maker Sup * Make suxe thot the st tsePL upgrade to the Something else that 3) Sta Sofe online —> Make 7 ee ory Groogle Safe Browsing Use re os lose tk lA you aten”t Using 4, a delete 36 Flom your com, Software anymore,then | How do )Install_ of fi apps—> We have to’ sty, apps only. We have have been Vent fted. ea fo av Rectote oar Remote to stick aith SPPIVed g, Ee G, Ps) exploits 4 by Apple a0 oogle, the vulnex Use antt-explort Software —> Use qaod. antt—mal. | 2) Loe —— ee na acc Psogvams, such of Maliosrebytes for Mac, Mal, > ty) Vulnerable Fi jtes fox 10S that ; Ox WPndous,Malwasebytes fo hat preact; obtacker | Secognize block maltctous software Fron, toy: 3) Clete advantage of Vulnevabilrttes 0 your Computer, = ee : Sesvess + L- Exploit Kits An explore et tS a progr, oa . ee lausch loses ea attackers can use to launch explot against. y, They « Vulnexabihities in installed software. and +l; Grip of Explorts: Lafond 1) Koo Nulnesabikties ~S The oe. , | = reteer eases arm SEB me. f cterty eeccenches too about ¢ have doce about thy DZew-day Erp ote URE Ire hot have «t| Ze 8 ‘bees reposted to the Pable ox sted i [€areriees Valnevabs Irties é Expo Bits 7 the nee. on ¥ Tofosmat cateqontes )Featex: B) Seane, 3 Enume, USIND the MAT, Pte _ | Hoe do Experts Occus ? tak to ay, | PRemote Explorts > Nests over a network sop ! ved peg IY exploits the Vulnerability rthout pYios access Baie: the vulnerable system. mt~malog,, | Dkecal Explotts —> Requttes priee access to the Vulnewable system § inc#eases” the ‘prtvilege & the voactively atteckex past those quonted, by the administtates faking — | 3) Clrect Explaits 5 Exploits ‘against cleat putes. applications exist 4 usually consist of modified Sewers that send an explort shen accessed with om thet | a cltent application. PEINSE! Knog, | They oly also sequixe tatesaction form the user 3 and ely on Social « engineesing techoiques- - Tofos notion Grathesing ? * Tt means gathering different Kinds of ‘oformatton umented cbeut the toxget. |RTE 's a method used by analysts * detesming aa the weeds of customess ond users. ¥nfermation Grathestog con be classified tnto 3 mafor categories t ) Feotpsinting Ofostpsinting? Tt 1s the techenyue to collect os about the + targeted ne || tofosmetion as pesstble System. | Whois > Te | ways to totwude on, *TLt helps hackers tm Vastous | bool to identify esganization’s systern. | fot that paste details. Open = Source Fontpsinting —p Tt 1S. the Safest shold, | 194 Stes all legal Kmttattens #hackess cr do 3 without email addvess because tt ts legal. | eee Seasch engines | Finding someone’s email addvess < phone a, Scanning IP through automated to0lS , Scavchtay «| t) Metageaf [/ Fe2POB house adduess ete aetp blicly Nei fera Network based Fostennting > Hocktivits can “ettieve information Such as usex name 920foam, ithin 2 group network Sexvices ete DNS Totessogation —> After gathering From different ateas using Vos 4 | Tous Fechniques, | A 1, _ the hackes usually qyuestes the DNS usiog | an Sewvex os v Frog Si that may Pre — existing tools. de. Tools: " | ) Whots —> Te 1S a semowned Intewnet tecosd, lists, an Poole identify who eons o domaine “either Few thot pasticulay dornain along with thets contact details. st shold H)Heavestes > 1 helps you: extvact o particular targets email addvess and Subdomains. Tk tS coded using @ Stenple pythen Scvipt that Seasches tofernatton Stasch engines Itke Groogle , Yahoo ete > oF #f) Metagoofil > Tt 15 used fos extiacting tafosmetton dato publicly avotlable on internet belonging te IE 1S oy tafermation aetna) ) Osgortznt % q echanism jan attactey uses to Cseate an over} happens on Scenaxto oF tanget osgantZation « ian 3 | | theft oF " Foyt Scanning — 7S a techny. ssed by th | IR Teams nt : 7 eer chntque d SI NEmLESOSE Fenetsatton testers 4 hackers emetic, £, ; arse ov ‘ y open del % CoIRT - fiom abich hackers Con _ x access, any osgantzatton’ * CERT — “YStem, * SOc — Vulnerability Scanning > Tt #5 Pesfoamed eye to detect possibility of Secoxtty attacks. te as Sen O€numesetion: It 1S a process where the attacker establishes an active connection with the Victim. “Incident Response “eae ts a group oF people who prepase fox and sespond. to any emergency tocident- * Incident Response Team members axe tained # Prepare, to fulfill the voles re | 9) Publ Tncidest —> It covers laxges effect a comm sty aS a whole tke nate etd) (husstcane ;tosnado, cost! Operation Teas Functionalittes ¢Responsibitties of 2F Tams @ Documentation © Legal ~epsesentation

You might also like