1 of 34

SEC 250

WEEK 1

2 of 34

AGENDA

  • Attendance
  • Introductions
  • Syllabus Review
  • Chapter 1
  • Class Activity
  • Review

3 of 34

INTRODUCTIONS

  • #WhoAreYou?
  • First name
  • Where are you from
  • Class rank (ex: First year, Super senior, etc.)
  • What brought you to Champlain College?
    • Follow up: What made you decide our Cybersecurity?
  • Favorite Games(s)? Hobbies? Music? Interests?
  • What are you hoping to gain from this course?

4 of 34

INTRODUCTIONS

  • #whoami

5 of 34

INTRODUCTIONS

  • Let’s review our Syllabus

6 of 34

THIS COURSE

In this introductory course, we will discuss & explore security topics, vulnerabilities, targets, risks methods to exploit vulnerabilities and means to security systems.

Also, don’t sweat it if you’re not familiar with terms! As we progress through this course, we’ll pick them up as we move forward.

7 of 34

WITH THAT …

What do we “know” about computer & network security?

  • Some history?
  • High level things?
  • Tech buzzwords?

8 of 34

RECENT SECURITY EVENTS

Data Breaches,

Malware attacks,

Software vulnerabilities,

Social engineering,

Emerging technologies,

Examples:

Targeted advertising (Malvertising?),

Voting machines.

9 of 34

FROM THE BOOK …

What is Security?

Security protecting what you or others have. This same idea applies to entities like government departments, agencies, companies, institutes, and so on, irrespective of their size or function.

The security of not only physical assets, but of non-physical assets as well are important and necessary. Some of these non-physical assets include confidential information and data; intellectual property; research data with the potential of high value realization and high investment; and the security of your customers or end users when at your facility or while using your systems. The security of the installations with high defense or strategic value, like nuclear installations, nuclear sources, chemical and biological laboratories, and areas with high-level political and administrative dignitaries, are of significance.

10 of 34

“JOE SPEAK”TM

What is Security?

Knowledge, techniques, tools, methods and persistence to protect stuff you and/or others place value upon based on risk, priority and means.

11 of 34

SCENARIO

What are the security concerns if someone finds/steals/borrows your ID card?

How could the system be improved so even if someone has your ID card, they can’t use it effectively?

Why isn’t such a system in place?

12 of 34

SCENARIO - MORE

What are the security concerns if someone finds/steals/borrows your ID card?

    • Gains access to areas they shouldn’t
      • May gain information about you they should not have.
    • Makes purchases
    • You can’t get access to what you need or make purchases

How could the system be improved so even if someone has your ID card, they can’t use it effectively?

      • Multiple factor authentication
      • Password, fingerprint, PIN

Why isn’t such a system in place?

      • Expensive
      • Time-consuming

13 of 34

THE ECONOMICS OF SECURITY

Security costs money, but does not generate profit.

Some examples -

  • Equipment: Firewalls, Intrusion Detection/Prevention devices
  • Slows down processing : passwords, authentication, just the process of constantly “being secure”
  • Personnel : production time + expertise, training

14 of 34

CAN YOU “NOT CARE” ABOUT SECURITY?

Um … no!

  • Certainly not in this discipline!

What are the risks?

    • Identity theft
    • $$
    • Intellectual property - someone gets access to your paper and submits it as their own
    • Data integrity: Somebody changes your information
    • Email
    • Security cameras

15 of 34

SECURITY CAMERAS – PRO/CON

Are security cameras a positive?

16 of 34

SECURITY: DAY-TO-DAY LIFE

Airport TSA: non-existent before 2001

Shopping online started ~ 1995

How many of you do $$ transactions on their phone?

What will security look like 10 years from now?

17 of 34

SECURITY FACTORS

What is the primary factor in “weak security”?

18 of 34

SECURITY FACTORS

What is the primary factor in “weak security”?

Yep, it’s us humans!

  • Passwords: Weak, same, or none!
  • Training: Do we even know what ‘secure’ is & how to get there?
  • Behavior: Internal & External threats

19 of 34

HOW IS SECURITY IMPLEMENTED?

Some examples of ways to secure:

    • Rooms, buildings: locks, alarms, fences, guards, mean dogs
    • Data on a computer: firewall, anti-virus, encryption, login/password
    • Update your devices!
    • Data traveling on a network: firewall, encryption
    • $$ transactions: authentication, encryption

20 of 34

TWO MAJOR APPROACHES

Things to live by …

1) Limit access to only those who need it

2) Transform data so it is only readable to those who need it.

21 of 34

DEFENSE-IN-DEPTH

Just like modern life … Information Systems (ISs) have become increasingly complex , comprised of multiple components/protocols operating at multiple layers/levels of technology.

Security has become increasingly complex as vulnerabilities have been discovered for all layers of an Information System

Thus, all layers/devices/communications need to be secured.

  • Fun fact: that’s why you’re here at CC!

22 of 34

DEFENSE IN DEPTH

.

A multi-layered defense that will allow us to still mount a successful defense should one or more of our defensive measures fail

23 of 34

QUICK EVOLUTION OF COMPUTER & INFO SECURITY

1950s-60s: Physical Security, & protect the mainframe

Mid-1960’s: Multi-User timesharing systems developed. Multiple users sharing the same hardware and OS. Protection was put in so that data was only seen by the right user

1969: ARPANET/Internet

1973: UNIX written in C with TCP/IP included

    • Provided user authentication (login/password
    • Different levels of access
    • Restrictions at the file level

24 of 34

NETWORKS - PCS

Mid 70s – 80s: PCs/LANs, WANS : most proprietary except Internet

Until mid 1990’s: EDU campuses only had a few machines connected to the Internet

  • People used command-line programs (read: no GUI!) over slow serial connections or phone modems to email

Viruses were starting to be an issue, but were transported on floppy disks rather than network.

25 of 34

WWW

Early 1990s: www developed!

Mid-late 90’s: TCP/IP available. Now each desktop could access the Internet.

  • This makes each computer a security threat vector!

This was a phenomenon similar to what we have today with IoT and personal devices expanding the Internet and vulnerable surfaces

26 of 34

INFORMATION SECURITY

Information security is meant to protect information and information systems from unauthorized users accessing, using, modifying, or destroying the information.

27 of 34

TOOLS, STANDARDS, GUIDELINES

Various tools are developed daily to combat the compromise of information security.

Several standards and guidelines have been implemented to reduce the propensity for information security breaches.

We’ll explore them throughout this course.

28 of 34

WHAT DOES SECURITY INCLUDE?

Information security also spans to aspects like hardware and infrastructure, the operating system, networks, applications, software systems, utilities, and tools.

Other important contributors (favorable or adverse) to the field of information security are human beings, particularly employees, contractors, system providers, hackers*.

29 of 34

INFORMATION SECURITY TODAY

Information is anything that is communicated in any form.

Any compromise of information can have a significant impact on the parties involved, including the loss of reputation, finances, or other consequences.

Pro Tip: All forms of technology are all under attack.

30 of 34

STATISTICS RE: SMARTPHONES

“The Norton Report3 (for 2013), now in its fourth year, is an annual research study, commissioned by Symantec, which examines consumers’ online behaviors, attitudes, security habits, and the dangers and financial cost of cybercrime.” The Norton Report highlights the following information3:

Consumers are more mobile than ever, but are leaving security behind. Despite the fact that 63% of those surveyed own smartphones and 30% own tablets, nearly one out of two users don’t take basic precautions such as using passwords, having security software, or backing up files on their mobile device.

Cybercrime continues to be a growing global concern. Both the total global direct cost of cybercrime (US $113 billion; up from $110 billion) and the average cost per victim of cybercrime ($298; up from $197) increased this year.

As people are now constantly connected, the lines are blurring between their personal and work lives, across multiple devices and storage solutions. Nearly half (49%) of the respondents report using their personal devices (PCs, laptops, smartphones, tablets) for work-related activities.”

31 of 34

SCENARIO: IS THE SECURITY ADEQUATE?

A hospital provides the security required by it’s vendor in order to satisfy government regulations. Records were kept on a server, secured with passwords and firewalls.

Later, hospital records are compromised and an attacker gets away with a list of hospital patients and their current medications. It was discovered that a former employee worked at a another hospital using the same application. There was a flaw in the application that allowed her to access the records of the previous hospital as well.

What’s the potential damage?

Who is liable?

32 of 34

GROUP ACTIVITY - CIA

Confidentiality –roughly equivalent to privacy. Measures undertaken to ensure confidentiality are designed to prevent sensitive information from reaching the wrong people, while making sure that the right people can in fact get it:

Integrity involves maintaining the consistency, accuracy, and trustworthiness of data over its entire life cycle. Data must not be changed in transit.

Availability For any information system to serve its purpose, the information must be available when it is needed. This means that the computing systems used to store and process the information, the security controls used to protect it, and the communication channels used to access it must be functioning correctly

Someone has your student ID card. Which of these is affected and how?

33 of 34

WHERE CAN WE LEARN MORE?

Just some Applicable Standards and Certifications

  • ISO/IEC 27001 — Information Systems Security Management System
  • Payment Card Industry Data Security Standard (PCI DSS)
  • Control Objectives for IT and related Technology (COBIT)
  • Health Insurance Portability And Accountability Act (HIPAA)
  • Federal Information Security Management Act (FISMA)
  • Federal Information Processing Standards (FIPS) released by the National Institute of Standards and Technology (NIST)
  • Family Educational Rights and Privacy Act (FERPA)

  • * Just become familiar with them, and to level up … start reviewing them!

34 of 34

REVIEW & WRAP UP

As we can see, the very term ‘security’ conjures up many facets with many perspectives.

We’ll start digging deeper each week, exploring further

To cyber means to dig deep & stretch yourself, while loving the process along the way! >:)