360 likes | 531 Views
Creative Commons License: You are free to share and remix but you must provide attribution and you must share alike. Information Security A Practical Introduction. What is (Information) Security About?. InfoSec is… about Hackers. InfoSec is… about Vandalism. InfoSec is… about Backups.
E N D
Creative Commons License: You are free to share and remix but you must provide attribution and you must share alike. Information SecurityA Practical Introduction
Information Security is an Outcome "Our systems aresecure from hackers“ "We haveblocked 17,342 viruses to date“ “Our systems are all online“ “Insiders cannotsteal our information” “We have backups” • “We are Secure”
Information Security is a Process “We want to improvesecurity“ "We need to protect against morethreats" "We want to reduce risk" "We want to increasecustomer confidence" "We want to decrease the number of compromises" • “We want to be more Secure”
InfoSec is… Risk Management Identify Measure Analyze Plan Implement
What is at Risk? Confidentiality Integrity Availability
Processleads to Outcome Firewalls do not make you secure Anti-virus does not make you secure Policiesdo not make you secure VPNs do not make you secure Guardsdo not make you secure Passwords do not make you secure Together they all make you MOREsecure
Threat: Unintentional DoS ? An unpatched server was compromised and used to distributed 20 GB of videos with French language titles. The problem was discovered when the server was blocked for excessive bandwidth usage.
French Puppet Videos! The server was distributing 20 GB of French Puppet Videos. The cleanup time was 7 hours. If they had just asked we would have probably found someone to host the videos for them!
Threat: The Man-in-the-Middle The Weaponized Pineapple Pretends to be YOURhome wifi network. Recordswhat you do on the Internet.
Counter: 2 Factor Authentication YUBIKEY SecurID Google 2FA
Counter: DLP and DPI • Deep Packet Inspection (DPI): • Firewalls inspect every packet on the network and rebuild the entire message. • Data Loss Prevention (DLP): • Uses DPI and pattern matching to look for suspicious content being sent FROM your network.
Threat: It never rains… it pours The OS Vendor stopped providing patches The server was hacked A hard disk failed A cooling fan died & it crashes every 2hr The software vendor wanted more money Hardware support had not been paid for
Final Threat: The A.P.T. Advanced Persistent Threat
InfoSec is… Everyone’s Responsibility Confidentiality Integrity Availability
More Threats • Spear-phishing • Credible emails, highly targeted, but malicious • USB Viruses: usb virus scanner, autorun, read-only storage • Automated
Questions? • Email: • michael@winterstorm.ca • Slides: • http://winterstorm.ca/download/