You are on page 1of 40

Fundamentals of Information

Systems Security
Lesson 10
Networks and Telecommunications

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 1
All rights reserved.
Learning Objective(s)
▪ Explain information systems security and
its effect on people and businesses.

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 2
All rights reserved.
Key Concepts
▪ Information systems security concepts
▪ Confidentiality, integrity, and availability (CIA)
▪ The seven domains of an IT infrastructure
▪ The weakest link in the security of an IT infrastructure
▪ IT security policy framework and data classification standard

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 3
All rights reserved.
Information Systems Security

Internet
• Is a worldwide network with more than 2 billion users
• Includes governments, businesses, and
organizations
• Links communication networks to one another
World Wide Web
• A system that defines how documents and
resources are related across network machines

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 4
All rights reserved.
Recent Data Breaches: Examples
Adobe Systems Incorporated, 2013
• Hackers published data for 150 million accounts
• Stole encrypted customer credit card data
• Compromised login credentials

U.S. Office of Personnel Management, 2015


• Data breach impacted 22 million people
• Stole SSNs, names, places of birth, addresses
• Millions must be monitored for identity theft for years

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 5
All rights reserved.
Cyberspace: The New Frontier

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 6
All rights reserved.
Internet of Things (IoT)

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 7
All rights reserved.
Risks, Threats, and Vulnerabilities

Likelihood that something bad will


Risk happen to an asset

Threat Any action that could damage an asset

A weakness that allows a threat to be


Vulnerability realized or to have an effect on an asset

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 8
All rights reserved.
What Is Information Systems
Security?

Hardware, operating system, and


Information application software that work together
system to collect, process, and store data for
individuals and organizations

Information The collection of activities that protect


system the information system and the data
stored in it
security

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 9
All rights reserved.
U.S. Compliance Laws Drive Need
for Information Systems Security

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 10
All rights reserved.
Tenets of Information Systems
Security

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 11
All rights reserved.
Confidentiality

National
Private data Intellectual security for
of property of countries
individuals businesses and
government

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 12
All rights reserved.
Confidentiality (cont.)

Practice of hiding data and keeping


Cryptography it away from unauthorized users

The process of transforming data


Encryption from cleartext into ciphertext

The scrambled data that are the


Ciphertext result of encrypting cleartext

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 13
All rights reserved.
Encryption of Cleartext into
Ciphertext

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 14
All rights reserved.
Integrity
Maintain valid, uncorrupted, and accurate
information

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 15
All rights reserved.
Availability
▪ In the context of information security
• The amount of time users can use a system,
application, and data

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 16
All rights reserved.
Availability Time Measurements

Uptime

Downtime

Availability [A = (Total Uptime)/(Total Uptime + Total Downtime)]

Mean time to failure (MTTF)

Mean time to repair (MTTR)

Mean time between failures (MTBF)

Recovery time objective (RTO)

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 17
All rights reserved.
Seven Domains of a Typical IT
Infrastructure

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 18
All rights reserved.
User Domain
Roles and tasks
• Users can access systems, applications, and data
depending upon their defined access rights.
Responsibilities
• Employees are responsible for their use of IT assets.

Accountability
• HR department is accountable for implementing proper
employee background checks.

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 19
All rights reserved.
Common Threats in the User Domain
▪ Lack of user awareness
▪ User apathy toward policies
▪ User violating security policy
▪ User inserting CD/USB with personal files
▪ User downloading photos, music, or videos
▪ User destructing systems, applications, and data
▪ Disgruntled employee attacking organization or
committing sabotage
▪ Employee blackmail or extortion
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Fundamentals of Information Systems Security www.jblearning.com Page 20
All rights reserved.
Workstation Domain

Roles and tasks


• Configure hardware, harden systems, and verify
antivirus files.
Responsibilities
• Ensure the integrity of user workstations and data.

Accountability
• Director of IT security is generally in charge of ensuring
that the Workstation Domain conforms to policy.

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 21
All rights reserved.
Common Threats in the
Workstation Domain
▪ Unauthorized workstation access
▪ Unauthorized access to systems, applications,
and data
▪ Desktop or laptop operating system vulnerabilities
▪ Desktop or laptop application software
vulnerabilities or patches
▪ Viruses, malicious code, and other malware
▪ User inserting CD/DVD/USB with personal files
▪ User downloading photos, music, or videos
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Fundamentals of Information Systems Security www.jblearning.com Page 22
All rights reserved.
LAN Domain

Roles and tasks


• Includes both physical network components and logical
configuration of services for users.
Responsibilities
• LAN support group is in charge of physical components
and logical elements.
Accountability
• LAN manager’s duty is to maximize use and integrity of
data within the LAN Domain.

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 23
All rights reserved.
Common Threats in the LAN Domain
▪ Unauthorized physical access to LAN
▪ Unauthorized access to systems, applications,
and data
▪ LAN server operating system vulnerabilities
▪ LAN server application software vulnerabilities
and software patch updates
▪ Rogue users on WLANs
▪ Confidentiality of data on WLANs
▪ LAN server configuration guidelines and
standards
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Fundamentals of Information Systems Security www.jblearning.com Page 24
All rights reserved.
LAN-to-WAN Domain
Roles and tasks
• Includes both the physical pieces and logical design of
security appliances. Physical parts need to be managed to
give easy access to the service.
Responsibilities
• Physical components, logical elements, and applying the
defined security controls.

Accountability
• Ensure that LAN-to-WAN Domain security policies,
standards, procedures, and guidelines are used.

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 25
All rights reserved.
Common Threats in the
LAN-to-WAN Domain
▪ Unauthorized probing and port scanning
▪ Unauthorized access
▪ IP router, firewall, and network appliance
operating system vulnerability
▪ Download of unknown file type attachments from
unknown sources
▪ Unknown email attachments and embedded URL
links received by local users

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 26
All rights reserved.
WAN Domain
Roles and tasks
• Allow users the most access possible while making
sure what goes in and out is safe.
Responsibilities
• Physical components and logical elements.

Accountability
• Maintain, update, and provide technical support and
ensure that the company meets security policies,
standards, procedures, and guidelines.

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 27
All rights reserved.
Common Threats in the WAN
Domain (Internet)
▪ Open, public, and accessible data
▪ Most traffic being sent as cleartext
▪ Vulnerable to eavesdropping
▪ Vulnerable to malicious attacks
▪ Vulnerable to denial of service
(DoS) and distributed denial of
service (DDoS) attacks
▪ Vulnerable to corruption of information/data
▪ Insecure TCP/IP applications
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Fundamentals of Information Systems Security www.jblearning.com Page 28
All rights reserved.
Common Threats in the WAN
Domain (Connectivity)
▪ Commingling of WAN IP traffic on the same
service provider router and infrastructure
▪ Maintaining high WAN service availability
▪ Using SNMP network management
applications and protocols maliciously (ICMP,
Telnet, SNMP, DNS, etc.)
▪ SNMP alarms and security monitoring 24 X 7
X 365

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 29
All rights reserved.
Remote Access Domain

Roles and tasks


• Connect mobile users to their IT systems through the
public Internet.
Responsibilities
• Maintain, update, and troubleshoot the hardware and
logical remote access connection.
Accountability
• Ensure that the Remote Access Domain security plans,
standards, methods, and guidelines are used.

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 30
All rights reserved.
Common Threats in the Remote
Access Domain
▪ Brute-force user ID and password attacks
▪ Multiple logon retries and access control attacks
▪ Unauthorized remote access to IT systems,
applications, and data
▪ Confidential data compromised remotely
▪ Data leakage in violation of data classification
standards

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 31
All rights reserved.
System/Application Domain

Roles and tasks


• Includes hardware and its logical design.
• Secure mission-critical applications and intellectual property
assets both physically and logically.
Responsibilities
• Server systems administration, database design and
management, designing access rights to systems and
applications, and more.
Accountability
• Ensure that security policies, standards, procedures, and
guidelines are in compliance.

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 32
All rights reserved.
Common Threats in the
System/Application Domain
▪ Unauthorized access to data centers, computer
rooms, and wiring closets
▪ Downtime of servers to perform maintenance
▪ Server operating systems software vulnerability
▪ Insecure cloud computing virtual environments by
default
▪ Corrupt or lost data
▪ Loss of backed-up data as backup media are
reused
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Fundamentals of Information Systems Security www.jblearning.com Page 33
All rights reserved.
Weakest Link in the Security of an IT
Infrastructure
User is weakest link in security

Strategies for reducing risk


• Check background of job candidates carefully.
• Evaluate staff regularly.
• Rotate access to sensitive systems, applications, and
data among staff positions.
• Test applications and software and review for quality
• Regularly review security plans.
• Perform annual security control audits.

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 34
All rights reserved.
Ethics and the Internet
▪ Human behavior online is often less mature than in normal
social settings
▪ Demand for systems security professionals is growing so
rapidly
▪ U.S. government and Internet Architecture Board (IAB) defined
a policy regarding acceptable use of Internet geared toward
U.S. citizens
• Policy is not a law or mandated

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 35
All rights reserved.
IT Security Policy Framework
Policy
• A short written statement that defines a course of
action that applies to entire organization

Standard
• A detailed written definition of how software and
hardware are to be used

Procedures
• Written instructions for how to use policies and
standards

Guidelines
• Suggested course of action for using policy,
standard, or procedure

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 36
All rights reserved.
Hierarchical IT Security Policy
Framework

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 37
All rights reserved.
Foundational IT Security Policies
▪ Acceptable use policy (AUP)
▪ Security awareness policy
▪ Asset classification policy
▪ Asset protection policy
▪ Asset management policy
▪ Vulnerability assessment/management
▪ Threat assessment and monitoring

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 38
All rights reserved.
Data Classification Standards
Data about people that must be kept
Private data private

Information or data owned by the


Confidential organization

Internal use Information or data shared internally


only by an organization

Public domain Information or data shared with the


data public

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 39
All rights reserved.
Summary
▪ Information systems security concepts
▪ Confidentiality, integrity, and availability (CIA)
▪ The seven domains of an IT infrastructure
▪ The weakest link in the security of an IT
infrastructure
▪ IT security policy framework and data
classification standard

© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company


Fundamentals of Information Systems Security www.jblearning.com Page 40
All rights reserved.

You might also like