information security security.pdf · hackers – attacks for the challenge – own subculture with...

38
Information Security Information Security By By Bhupendra Ratha, Lecturer Bhupendra Ratha, Lecturer School of Library & Information Science School of Library & Information Science D.A.V.V., Indore D.A.V.V., Indore E-mail:[email protected] mail:[email protected]

Upload: others

Post on 30-Sep-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Information security security.pdf · Hackers – Attacks for the challenge – Own subculture with names, lingo and rules – Stereotypically young, male and socially – Can have

Information Security Information Security

ByByBhupendra Ratha, LecturerBhupendra Ratha, Lecturer

School of Library & Information ScienceSchool of Library & Information ScienceD.A.V.V., IndoreD.A.V.V., Indore

EE--mail:[email protected]:[email protected]

Page 2: Information security security.pdf · Hackers – Attacks for the challenge – Own subculture with names, lingo and rules – Stereotypically young, male and socially – Can have

Outline of Information SecurityOutline of Information Security IntroductionIntroduction Impact of informationImpact of information Need of Information Security.Need of Information Security. Objectives of Information Security.Objectives of Information Security. Areas of Information Security. Areas of Information Security. Types of attackersTypes of attackers Why attacks?Why attacks? Methods of Attacking on the InformationMethods of Attacking on the Information Methods of Defending the InformationMethods of Defending the Information Tips for the Information SecurityTips for the Information Security

Page 3: Information security security.pdf · Hackers – Attacks for the challenge – Own subculture with names, lingo and rules – Stereotypically young, male and socially – Can have

IntroductionIntroduction

Information Security is a complicated area and can Information Security is a complicated area and can be addressed by wellbe addressed by well--trained and experienced trained and experienced Professionals.Professionals.

“When there is an attack on the system with the “When there is an attack on the system with the help of different threats, it means that our system help of different threats, it means that our system is working very slowly, damaged and our is working very slowly, damaged and our information are unsecured” is called Information information are unsecured” is called Information insecurity. This is a very big problem. insecurity. This is a very big problem.

The The Information SecurityInformation Security is the solution for it.is the solution for it.

Page 4: Information security security.pdf · Hackers – Attacks for the challenge – Own subculture with names, lingo and rules – Stereotypically young, male and socially – Can have

Importance of InformationImportance of Information Our work is based on records (information).Our work is based on records (information). We spend minimum half our day with documentsWe spend minimum half our day with documents 15% of Rs. spent managing documents.15% of Rs. spent managing documents. Can’t work without data, record or informationCan’t work without data, record or information

Page 5: Information security security.pdf · Hackers – Attacks for the challenge – Own subculture with names, lingo and rules – Stereotypically young, male and socially – Can have

Need of Information SecurityNeed of Information Security To privacy of our Data/InformationTo privacy of our Data/Information To safely data savingTo safely data saving Theft own Data/InformationTheft own Data/Information To avoid bad use of our dataTo avoid bad use of our data Lack of time Lack of time Lack of moneyLack of money Lack of human resourcesLack of human resources

Page 6: Information security security.pdf · Hackers – Attacks for the challenge – Own subculture with names, lingo and rules – Stereotypically young, male and socially – Can have

Objectives of Data/Inf. SecurityObjectives of Data/Inf. Security

Objectives of Data/Info. security

Integrity

Confidentiality

Authenticity

Availability

Page 7: Information security security.pdf · Hackers – Attacks for the challenge – Own subculture with names, lingo and rules – Stereotypically young, male and socially – Can have

Security AreasSecurity Areas

Basically three areas of securityBasically three areas of security

1.1. Physical securityPhysical security2.2. Network securityNetwork security3.3. Database SecurityDatabase Security

Page 8: Information security security.pdf · Hackers – Attacks for the challenge – Own subculture with names, lingo and rules – Stereotypically young, male and socially – Can have

Physical SecurityPhysical Security Keep the servers in locked room with network and Keep the servers in locked room with network and

power cables snipped off.power cables snipped off. Security of other hardware and machinery Security of other hardware and machinery

Page 9: Information security security.pdf · Hackers – Attacks for the challenge – Own subculture with names, lingo and rules – Stereotypically young, male and socially – Can have

Network SecurityNetwork Security Network security all entry points to a network should be guarded.Network security all entry points to a network should be guarded.

FirewallModem

Internet

Switch

Scanner

Workstation

Printer

ServerUnprotected Network

Protected LAN

Page 10: Information security security.pdf · Hackers – Attacks for the challenge – Own subculture with names, lingo and rules – Stereotypically young, male and socially – Can have

Database SecurityDatabase Security

Database IntegrityDatabase Integrity User AuthenticationUser Authentication Access ControlAccess Control AvailabilityAvailability

Page 11: Information security security.pdf · Hackers – Attacks for the challenge – Own subculture with names, lingo and rules – Stereotypically young, male and socially – Can have

Types of AttackersTypes of Attackers HackersHackers Lone criminalsLone criminals PolicePolice Malicious insidersMalicious insiders Press/mediaPress/media TerroristsTerrorists Industrial espionage Industrial espionage National intelligence organizationsNational intelligence organizations Info warriorsInfo warriors

Page 12: Information security security.pdf · Hackers – Attacks for the challenge – Own subculture with names, lingo and rules – Stereotypically young, male and socially – Can have

HackersHackers–– Attacks for the challengeAttacks for the challenge–– Own subculture with names, lingo and rulesOwn subculture with names, lingo and rules–– Stereotypically young, male and socially Stereotypically young, male and socially –– Can have considerable expertise and passion for Can have considerable expertise and passion for

attacksattacks

Page 13: Information security security.pdf · Hackers – Attacks for the challenge – Own subculture with names, lingo and rules – Stereotypically young, male and socially – Can have

Lone criminalsLone criminals–– Attack for financial gainAttack for financial gain–– Cause the bulk of computerCause the bulk of computer--related crimesrelated crimes–– Usually target a single method for the attackUsually target a single method for the attack

Page 14: Information security security.pdf · Hackers – Attacks for the challenge – Own subculture with names, lingo and rules – Stereotypically young, male and socially – Can have

Malicious insidersMalicious insiders–– Already inside the systemAlready inside the system–– Knows weaknesses and tendencies of the Knows weaknesses and tendencies of the

organizationorganization–– Very difficult to catchVery difficult to catch

Page 15: Information security security.pdf · Hackers – Attacks for the challenge – Own subculture with names, lingo and rules – Stereotypically young, male and socially – Can have

Press/mediaPress/media

–– Gather information for a story to sell papers/ Gather information for a story to sell papers/ commercial timecommercial time

PolicePolice––Lines are sometimes crossed when gathering information Lines are sometimes crossed when gathering information to pursue a caseto pursue a case

Page 16: Information security security.pdf · Hackers – Attacks for the challenge – Own subculture with names, lingo and rules – Stereotypically young, male and socially – Can have

TTerrorists

––Goal is disruption and damage. Goal is disruption and damage. ––Most have few resources and skilled.Most have few resources and skilled.

Page 17: Information security security.pdf · Hackers – Attacks for the challenge – Own subculture with names, lingo and rules – Stereotypically young, male and socially – Can have

National Intelligence OrganizationsNational Intelligence Organizations

To investigation of different casesTo investigation of different cases

Industrial EspionageIndustrial Espionage

•• To discover a competitors strategic marketingTo discover a competitors strategic marketing

Page 18: Information security security.pdf · Hackers – Attacks for the challenge – Own subculture with names, lingo and rules – Stereotypically young, male and socially – Can have

Info warriorsInfo warriors–– Military based group targeting information or Military based group targeting information or

networking infrastructuresnetworking infrastructures–– Lots of resourcesLots of resources–– Willing to take high risks for short term gainWilling to take high risks for short term gain

Page 19: Information security security.pdf · Hackers – Attacks for the challenge – Own subculture with names, lingo and rules – Stereotypically young, male and socially – Can have

Why attacks?Why attacks?

To publicity To publicity To financial gainTo financial gain JealousnessJealousness To funTo fun To competition with the person of same fieldTo competition with the person of same field

Page 20: Information security security.pdf · Hackers – Attacks for the challenge – Own subculture with names, lingo and rules – Stereotypically young, male and socially – Can have

Specific types of attacksSpecific types of attacks

Engineering attacksEngineering attacks Physical attacksPhysical attacks Environmental attacksEnvironmental attacks

Page 21: Information security security.pdf · Hackers – Attacks for the challenge – Own subculture with names, lingo and rules – Stereotypically young, male and socially – Can have

Engineering attacksEngineering attacks VirusesViruses

String of computer code that attaches to other programs and replicatesString of computer code that attaches to other programs and replicates

WormsWorms Replicates itself to multiple systemsReplicates itself to multiple systems Rarely dangerous, mostly annoyingRarely dangerous, mostly annoying

Trojan HorsesTrojan Horses Collects information and sends to known site on the networkCollects information and sends to known site on the network Also can allow external takeover of your systemAlso can allow external takeover of your system

Page 22: Information security security.pdf · Hackers – Attacks for the challenge – Own subculture with names, lingo and rules – Stereotypically young, male and socially – Can have

Cont…Cont…

Attacker

Virus

Our system

colleague

Page 23: Information security security.pdf · Hackers – Attacks for the challenge – Own subculture with names, lingo and rules – Stereotypically young, male and socially – Can have

Cont..Cont..–– Password sniffingPassword sniffing Collect first parts of data packet and look for login Collect first parts of data packet and look for login

attemptsattempts

–– IP Spoofing IP Spoofing Fake packet to “hijack” a session and gain accessFake packet to “hijack” a session and gain access

--Port scanningPort scanning Automated process that looks for open networking portsAutomated process that looks for open networking ports Logs positive hits for later exploitsLogs positive hits for later exploits

Page 24: Information security security.pdf · Hackers – Attacks for the challenge – Own subculture with names, lingo and rules – Stereotypically young, male and socially – Can have

Physical attacksPhysical attacks

Equipment failure arising from defective Equipment failure arising from defective components.components.

Temperature and humidity.Temperature and humidity. Physical destruction of hardware and equipmentPhysical destruction of hardware and equipment Theft or sabotage.Theft or sabotage.

Page 25: Information security security.pdf · Hackers – Attacks for the challenge – Own subculture with names, lingo and rules – Stereotypically young, male and socially – Can have

Environmental AttacksEnvironmental Attacks

Natural DisastersNatural DisastersFire, Earthquakes etc.Fire, Earthquakes etc.

ManMan--Made DisastersMade DisastersWar, Chemical Leaks etc.War, Chemical Leaks etc.

Page 26: Information security security.pdf · Hackers – Attacks for the challenge – Own subculture with names, lingo and rules – Stereotypically young, male and socially – Can have

Methods of Information Security ThreatsMethods of Information Security Threats

BackupsBackups Antivirus SoftwareAntivirus Software CryptographyCryptography BiometricsBiometrics Honey potsHoney pots Firewalls Firewalls Burglar alarmsBurglar alarms

Page 27: Information security security.pdf · Hackers – Attacks for the challenge – Own subculture with names, lingo and rules – Stereotypically young, male and socially – Can have

Backups Backups

Backups allow us to restore damaged or Backups allow us to restore damaged or destroyed data.destroyed data.

We can set up backup servers on the network.We can set up backup servers on the network. Backup media areBackup media are-- Floppy disks, external hard Floppy disks, external hard

disks, ISP online backup.disks, ISP online backup.

Page 28: Information security security.pdf · Hackers – Attacks for the challenge – Own subculture with names, lingo and rules – Stereotypically young, male and socially – Can have

AntivirusAntivirus

Antivirus is a program that we can install on Antivirus is a program that we can install on our computer to detect and remove viruses.our computer to detect and remove viruses.

It is used to scan hard disks, floppy disks, It is used to scan hard disks, floppy disks, CDs, for viruses and scan eCDs, for viruses and scan e--mail messages and mail messages and individual files, downloads from the Net.individual files, downloads from the Net.

Page 29: Information security security.pdf · Hackers – Attacks for the challenge – Own subculture with names, lingo and rules – Stereotypically young, male and socially – Can have

CryptographyCryptography

Cryptography is the art of converting info. Into a Cryptography is the art of converting info. Into a secret code that can be interpreted only by a person secret code that can be interpreted only by a person who knows how to decode it.who knows how to decode it.

Cipher text

Encrypted

Decrypted

Plain text

Page 30: Information security security.pdf · Hackers – Attacks for the challenge – Own subculture with names, lingo and rules – Stereotypically young, male and socially – Can have

Example of CryptographyExample of Cryptography

Original messageSender

Original messageReceiver

Encrypted Decrypted

Page 31: Information security security.pdf · Hackers – Attacks for the challenge – Own subculture with names, lingo and rules – Stereotypically young, male and socially – Can have

BioinformaticsBioinformatics

The bioinformetics authentication process uses a The bioinformetics authentication process uses a person’s unique physical characteristics to person’s unique physical characteristics to authentically the identity.authentically the identity.

Bioinformatics authentication method fingerprint Bioinformatics authentication method fingerprint recognition, voice authentication, face recognition, recognition, voice authentication, face recognition, keystroke dynamics and retina.keystroke dynamics and retina.

FingerprintFingerprint RetinaRetina

Page 32: Information security security.pdf · Hackers – Attacks for the challenge – Own subculture with names, lingo and rules – Stereotypically young, male and socially – Can have

Honey potsHoney pots

A honey pots is a tool used for detecting an A honey pots is a tool used for detecting an intrusion attempt.intrusion attempt.

A honey pots simulates a vulnerable computer A honey pots simulates a vulnerable computer on a network.on a network.

It contains no critical data or application but has It contains no critical data or application but has enough data to lure an intruder.enough data to lure an intruder.

Page 33: Information security security.pdf · Hackers – Attacks for the challenge – Own subculture with names, lingo and rules – Stereotypically young, male and socially – Can have

Honey potsHoney pots

Honey potsIntruder

Page 34: Information security security.pdf · Hackers – Attacks for the challenge – Own subculture with names, lingo and rules – Stereotypically young, male and socially – Can have

FirewallFirewall

A firewall is a tool for the network security A firewall is a tool for the network security that stand between trusted and entrusted that stand between trusted and entrusted networks and inspecting all traffic that flows networks and inspecting all traffic that flows between them.between them.

In simple language firewall is a filter In simple language firewall is a filter machine that monitors the type of traffic that machine that monitors the type of traffic that flows in and out of the network.flows in and out of the network.

Page 35: Information security security.pdf · Hackers – Attacks for the challenge – Own subculture with names, lingo and rules – Stereotypically young, male and socially – Can have

Private network

FirewallFirewall

Internet

FirewallFirewall

Page 36: Information security security.pdf · Hackers – Attacks for the challenge – Own subculture with names, lingo and rules – Stereotypically young, male and socially – Can have

Burglar alarmsBurglar alarms Traps set on specific networked objects that Traps set on specific networked objects that

go off if accessedgo off if accessed

Page 37: Information security security.pdf · Hackers – Attacks for the challenge – Own subculture with names, lingo and rules – Stereotypically young, male and socially – Can have

Tips for information SecurityTips for information Security Use of strong passwordUse of strong password Adopt a security policy Adopt a security policy Use of antiUse of anti--virus.virus. Information security officerInformation security officer Use of firewallsUse of firewalls Use of bioinformaticsUse of bioinformatics Beware to malicious insidersBeware to malicious insiders Security training Security training Use of other security toolsUse of other security tools

Page 38: Information security security.pdf · Hackers – Attacks for the challenge – Own subculture with names, lingo and rules – Stereotypically young, male and socially – Can have