200 likes | 794 Views
IT255 Introduction to Information Systems Security Unit 2 Application of Security Countermeasures to Mitigate Malicious Attacks. Learning Objective. Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure. Key Concepts.
E N D
IT255 Introduction to Information Systems Security Unit 2 Application of Security Countermeasures to Mitigate Malicious Attacks
Learning Objective Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.
Key Concepts • Attacks, threats, and vulnerabilities in a typical IT infrastructure • Common security countermeasures typically found in an IT infrastructure • Risk assessment approach to securing an IT infrastructure • Risk mitigation strategies to shrink the information security gap
Definitions • Risk: Probability that an intentional or unintentional act will harm resources • Threat: Any accidental or intentional event that negatively impacts company resources • Vulnerability: Inherent weakness that may enable threats to harm system or networks Risks, threats, and vulnerabilities affect confidentiality, integrity, and availability (CIA).
Types of Threats • Malicious software • Device failure • Application failure • Natural disaster • Intrusive cracker
Types of Vulnerabilities • Insecure servers or services • Exploitable applications and protocols • Unprotected system or network resources • Traffic interception and eavesdropping • Lack of preventive and protective measures against malware or automated attacks
Identify the Criminal Criminal Profile #1 • Victimizes people through unsolicited e-mail messages to get victim’s money • Does not rely on intrusive methods to commit crimes • Is motivated by financial gain
Answer… Internet scammer
Identify the Criminal (Continued) Criminal Profile #2 • Enters systems without permission to raise awareness of security issues • Does not work for the company or its clients • Does not intend harm, just tries to be “helpful” • Is motivated by impulse
Answer… Gray-hat hacker
Identify the Criminal (Continued) Criminal Profile #3 • Engages in illegal black market transactions on the Internet • Traffics drugs, weapons, or banned materials • Is motivated by financial gain
Answer… Terrorists or traffickers
Identify the Criminal (Continued) Criminal Profile #4 • Enters systems without permission to take advantage of security issues • Does not work for the company or its clients • Does not intend to help, only wants to cause harm • Is motivated by peer acceptance
Answer… Black-hat hacker or cracker
Identify the Criminal (Continued) Criminal Profile #5 • Intrudes upon systems to verify and validate security issues • Works for the company or one of its clients • Does not intend harm, just tries to be “helpful”
Answer… White-hat hacker
Summary • Threats are controllable. • Risks are manageable. • Vulnerabilities are unavoidable. • All of these negatively affect the CIA triad. • Not all threats are intentional.