320 likes | 330 Views
Learn how to mitigate security risks and protect information in a network environment. Explore concepts such as confidentiality, integrity, availability, authentication, and data security. Understand the types of threats, including malicious software and unauthorized access, and discover protective measures like user awareness, authentication, and encryption. Gain insights into the mindset of hackers and learn about ethical hacking.
E N D
Introduction ET4/5085 Keamanan Jaringan Telekomunikasi
Course site: rhinestonecowboy1202.wordpress.com • Course schedule: • Tuesday : 13.00 – 13.50 • Thursday : 16.00 – 17.40 • Refs: • Various towards CompTIA Security+ certification
There is nothing that could be completely secure • There is no perfect scenario
To defend against the worst CIA Confidentiality, Integrity, and Availability
Confidentiality - Preventing the disclosure of information to unauthorized persons. • Integrity- the property that information has not be altered in an unauthorized way • Availability • The property that information is accessible and modifiable in a timely fashion by those authorized to do so. • Availability assures that a system’s authorized users have timely and uninterrupted access to the information in the system and to the network.
Information security is achieved through a combination of three entities
Comprehensive definition of information security • That which protects the integrity, confidentiality, and availability of information on the devices that store, manipulate, and transmit the information through products, people, and procedures
Another acronym to live by AAA Authentication When a person’s identity is established with proof and confirmed by a system Authorization When a user is given access to certain data or areas of a building. Accounting The tracking of data, computer usage, and network resources When you have indisputable proof of something users have done and they cannot deny it, it is known as nonrepudiation
Data security is the act of protecting data from threats and possible corruption
Type of threats • Malicious software • Unauthorized access • System failure • Social engineering
Malicious Software • Malware • Viruses • Worms • Trojan horses • Spyware • Rootkits • Adware • and other types of unwanted software
Unauthorized access • Access to computer resources and data without consent of the owner • Approaching the system • Trespassing • Communicating • Storing and retrieving data • Intercepting data • improper administrative access • Any other methods that would interfere with a computer’s normal work
System failure • Computer crashes or individual application failure • Causes: • user error • malicious activity • or hardware failure
Social engineering Bapak kamu hacker ya? Kok tau? • The act of manipulating users into revealing confidential information or performing other actions detrimental to the user Karena kamu telah meng-hack hatiku
Protections against, or to help recoverfrom, the threats • User awareness • Authentication • Antimalware software • Data backups • Encryption • Data removal
User awareness • The wiser the user, the less chance of security breaches • Employee training and education • Easily accessible and understandable policies • Security-awareness e-mails • Online security resources
Authentication • The verification of a person’s identity that helps protect against unauthorized access • Something the user knows • a password or PIN • Something the user has • smart card or other security token • Something the user is • biometric reading of a fingerprint or retina scan
Antimalware software • Protects a computer from the various forms of malware, and if necessary, detects and removes them • antivirus and antispyware software
Data backups • Backups won’t stop damage to data • Can enable you to recover data after an attack or other compromise, or system failure
Encryption • The act of changing information using an algorithm known as a cipher to make it unreadable to anyone except users who possess the proper “key” to the data
Data removal • Proper data removal goes far beyond file deletion or the formatting of digital media • The problem with file deletion/formatting is data remanence, or the residue, that is left behind, from which re-creation of files can be accomplished by some less-than-reputable people with smart tools • Companies options to data removal: • Clearing • Purging (also known as sanitizing) • Destruction
You Must Understand the Hacker Think A Like A Hacker
White Hats • Nonmalicious • IT person who attempts to hack into a computer system before it goes live to test it • Involved in something known as ethical hacking
Ethical hacker is an expert at breaking into systems and can attack systems on behalf of the system’s owner and with the owner’s consent • The ethical hacker will use penetration testing and intrusion testing to attempt to gain access to a target network or system
Black hats • These are malicious and attempt to break into computers and computer networks without authorization • Black hats are the ones who attempt identity theft, piracy, credit card fraud, and so on.
Grey Hats • Individuals who do not have any affiliation with a company but risk breaking the law by attempting to hack a system and then notify the administrator of the system that they were successful in doing so • Not to do anything malicious (other than breaking in...) • Some offer to fix security vulnerabilities at a price • Also known as green hats or mercenaries
Blue hats • Individuals who are asked to attempt to hack into a system by an organization, but the organization does not employ them • The organization relies on the fact that the person simply enjoys hacking into systems • Usually, this type of scenario occurs when testing systems
Elite • Elite hackers are the ones who first find out about vulnerabilities • 1 out of an estimated 10,000 hackers • Many of these types of individuals don’t usually care about “credit due” and are more interested in anonymity
Constant battle between administrators and attackersyou need to be on your toes; you need to review logs often; you need to employ as many security precautions as possible; you need to keep abreast of the latest attacks and ways tomitigate your risk; never underestimate the power and resilience of a hacker.