© 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Fundamentos da segurança dos
sistemas de informação
Unit 1
Information Systems Security
Fundamentals
Page 2Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Learning Objective
Explain the concepts of information systems
security (ISS) as applied to an IT
infrastructure.
Page 3Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Key Concepts
§ Confidentiality, integrity, and availability (CIA)
concepts
§ Layered security solutions implemented for the
seven domains of a typical IT infrastructure
§ Common threats for each of the seven domains
§ IT security policy framework
§ Impact of data classification standard on the
seven domains
Page 4Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com
DISCOVER: CONCEPTS
Page 5Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Introducing ISS
ISS
Informat
ion
System
s
Informat
ion
Page 6Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com
The CIA Triad
Confidentiality
Integrity
Availability
Page 7Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Confidentiality
Personal Data and Information
• Credit card account numbers and bank account numbers
• Social Security numbers and address information
Intellectual Property
• Copyrights, patents, and secret formulas
• Source code, customer databases, and technical specifications
National Security
• Military intelligence
• Homeland security and government-related information
Page 8Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com
O que estamos protegendo?
Page 9Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Integrity
Maintain valid, uncorrupted, and accurate
information.
§ User names
and passwords
§ Patents and copyrights
§ Source code
§ Diplomatic information
§ Financial data
Page 10Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Page 11Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Availability
X
X
X
Page 12Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Conduct and Ethics in ISS
§ISS is a classic battle of “good vs. evil.”
§No global laws, rules, or regulations govern
cyberspace.
§U.S. government and Internet Architecture
Board (IAB) have developed joint Internet
acceptable use policy (AUP).
§Security professionals are in high demand
as the “good guys.”
Page 13Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Leis de Conformidade
Page 14Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Compliance Laws Driving ISS
Health Insurance Portability and
Accountability Act (HIPAA)
Sarbanes-Oxley (SOX) Act
Children’s Internet Protection Act (CIPA)
Page 15Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com
IT Security Policy Framework
POLICY
Standard
Procedure
Guideline
A short written statement that defines a
course of action that applies to the entire
organization
A detailed written definition of how
software and hardware are to be used
Written instructions for how to use
the policy and standard
Suggested course of action for using
the policy, standard, or procedure
Page 16Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Page 17Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Seven Domains of a Typical IT
Infrastructure
Page 18Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Ciberespaço: uma nova fronteira
Page 19Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Page 20Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com
O que está representado na figura?
Page 21Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Common Threats in the User
Domain
§Lack of user awareness
§User apathy toward policies
§User violating security policy
§User inserting CD/DVD/USB with personal
files
Page 22Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Common Threats in the User
Domain (Continued)
§User downloading photos, music, or videos
§User destructing systems, applications, and
data
§Disgruntled employee attacking
organization or committing sabotage
§Employee blackmail or extortion
Page 23Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com
§Unauthorized workstation access
§Unauthorized access to systems,
applications, and data
§Desktop or laptop operating system
vulnerabilities
§Desktop or laptop application software
vulnerabilities or patches
Common Threats in the
Workstation Domain
Page 24Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com
§Viruses, malicious code, and other malware
§User inserting CD/DVD/USB with personal
files
§User downloading photos, music, or videos
Common Threats in the
Workstation Domain (Continued)
Page 25Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Common Threats in the LAN
Domain
§Unauthorized physical access to LAN
§Unauthorized access to systems,
applications, and data
§LAN server operating system vulnerabilities
§LAN server application software
vulnerabilities and software patch
updates
Page 26Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Common Threats in the LAN
Domain (Continued)
§Rogue users on WLANs
§Confidentiality of data on WLANs
§LAN server configuration guidelines and
standards
Page 27Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com
§Unauthorized probing and port scanning
§Unauthorized access
§Internet Protocol (IP) router, firewall, and
network appliance operating system
vulnerability
§Local users downloading
unknown file types from unknown
sources
Common Threats in the
LAN-to-WAN Domain
WAN
Page 28Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com
§Open, public, and accessible data
§Most of the traffic being sent as clear text
§Vulnerable to eavesdropping
§Vulnerable to malicious attacks
§Vulnerable to Denial of Service
(DoS) and Distributed Denial of
Service (DDoS) attacks
Common Threats in the WAN
Domain
WAN
Page 29Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com
§Vulnerable to corruption of information and
data
§Insecure Transmission Control
Protocol/Internet Protocol
(TCP/IP) applications
§Hackers and attackers e-mailing
Trojans, worms, and malicious
software freely and constantly
Common Threats in the WAN
Domain (Continued)
WAN
Page 30Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Common Threats in the Remote
Access Domain
Internet
§ Brute force user ID and password attacks
§ Multiple logon retries and access control attacks
§ Unauthorized remote access to
IT systems, applications, and data
§ Confidential data compromised
remotely
§ Data leakage in violation of data
classification standards
Page 31Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Common Threats in the
Systems/Applications Domain
Cloud
Computing
§ Unauthorized access to data centers, computer
rooms, and wiring closets
§ Difficult-to-manage servers that require high
availability
§ Server operating systems software
vulnerability management
§ Security required by cloud computing
virtual environments
§ Corrupt or lost data
Page 32Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com
DISCOVER: PROCESSES
Page 33Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Implementing the CIA Triad
Confidentiality
AUP
Security Awareness
Policy
Enhanced Access
Control
Page 34Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Implementing the CIA Triad
(Continued)
Integrity
AUP
Security Awareness
Policy
Enhanced Access Control
Threat Assessment
and Monitoring
Asset Protection Policy
Vulnerability Assessment
and Management
Page 35Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Implementing the CIA Triad
(Continued)
Availability
AUP
Security Awareness
Policy
Enhanced Access
Control
Threat Assessment
and Monitoring
Asset Protection Policy
Vulnerability Assessment
and Management
Data Classification
Standard
Page 36Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com
DISCOVER: ROLES
Page 37Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Who Implements the CIA Triad?
Confidentiality Integrity Availability
§User
§IT administrator
§Network
administrator
§Human
resources
§Senior
management
§User
§IT administrator
§Network
administrator
§Human
resources
§Senior
management
§IT administrator
§Network
administrator
§Third-party vendor
Page 38Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Summary
§Terms associated with ISS include risks,
threats, and vulnerabilities.
§Layered security strategy protects an IT
infrastructure’s CIA.
§IT policy framework includes policies,
standards, procedures, and guidelines.
§Data classification standard defines how
data is to be handled within an IT
infrastructure.

More Related Content

PDF
Aula 02 - Aplicação de contramedidas de segurança para mitigar ataques malici...
PDF
Aula 04 - Implementação efetiva da política de segurança
PDF
Aula 03 - Controles de acesso apropriados para sistemas, aplicativos e acesso...
PDF
Aula 05 - Importância do teste, auditoria e monitoramento
PPTX
William A. Tanenbaum Association of Benefit Administrators April 2015
PDF
Cisco Cybersecurity Essentials Chapter- 7
PDF
A 5 step guide to protecting backup data by Iron Mountain
PDF
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Aula 02 - Aplicação de contramedidas de segurança para mitigar ataques malici...
Aula 04 - Implementação efetiva da política de segurança
Aula 03 - Controles de acesso apropriados para sistemas, aplicativos e acesso...
Aula 05 - Importância do teste, auditoria e monitoramento
William A. Tanenbaum Association of Benefit Administrators April 2015
Cisco Cybersecurity Essentials Chapter- 7
A 5 step guide to protecting backup data by Iron Mountain
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...

Similar to Aula 01 - Fundamentos da segurança dos sistemas de informações (20)

DOCX
Security Strategies in Windows Platforms and ApplicationsL.docx
DOCX
Security Strategies in Windows Platforms and ApplicationsL.docx
PDF
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
PPTX
Dr_Kamal_ch01.pptx
PPTX
Five Common Causes of Data Breaches
PPT
Data security in the cloud
PDF
Idera live 2021: Database Auditing - on-Premises and in the Cloud by Craig M...
PDF
Meetup presenation 06192013
PDF
Data security in a big data environment sweden
PPT
M7 internet security
PPT
Network Security for Computer science and Engineering.ppt
PDF
Protecting What Matters...An Enterprise Approach to Cloud Security
DOCX
CHap 13 and 12winsec3e_ppt_ch12(1).pptxSecurity Strategies
PPTX
Advanced Persistent Threat - Evaluating Effective Responses
PDF
Top Strategies to Capture Security Intelligence for Applications
PDF
Better to Ask Permission? Best Practices for Privacy and Security
PDF
Simplifying data privacy and protection.pdf
PPT
Dstca
PDF
INT 1010 07-4.pdf
PDF
Perimeter Security is Failing
Security Strategies in Windows Platforms and ApplicationsL.docx
Security Strategies in Windows Platforms and ApplicationsL.docx
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Dr_Kamal_ch01.pptx
Five Common Causes of Data Breaches
Data security in the cloud
Idera live 2021: Database Auditing - on-Premises and in the Cloud by Craig M...
Meetup presenation 06192013
Data security in a big data environment sweden
M7 internet security
Network Security for Computer science and Engineering.ppt
Protecting What Matters...An Enterprise Approach to Cloud Security
CHap 13 and 12winsec3e_ppt_ch12(1).pptxSecurity Strategies
Advanced Persistent Threat - Evaluating Effective Responses
Top Strategies to Capture Security Intelligence for Applications
Better to Ask Permission? Best Practices for Privacy and Security
Simplifying data privacy and protection.pdf
Dstca
INT 1010 07-4.pdf
Perimeter Security is Failing
Ad

More from Leinylson Fontinele (20)

PDF
Utilização do editor de texto Word
PPTX
Prática com slide.pptx
PPSX
A galinha carijó
PDF
Descrição do Projeto 8 puzzle
PDF
Aula 02 - Agentes Inteligentes
PDF
Aula 01 - Visão Geral da IA
PDF
A história da Segurança da Informação
PDF
Introdução ao Prolog - Prof. Sérgio S. Costa
PDF
Caso 1 - Boing 777
PDF
Caso 2 - Aeroporto de Denver
PDF
Aula 02 - Agentes e problemas de busca
PDF
Aula 01 - Visão geral da IA
PDF
Aula 7 - Modelagem de Software
PDF
Aula 6 - Qualidade de Software
PDF
Aula 07 - Diagrama de sequencia
PDF
Aula 06 - Diagrama de classes
PDF
Aula 04 - Diagrama de casos de uso
PDF
Aula 1 - Introdução a Engenharia de Software
PDF
Aula 2 - Modelos de processos
PDF
Minicurso de App Inventor
Utilização do editor de texto Word
Prática com slide.pptx
A galinha carijó
Descrição do Projeto 8 puzzle
Aula 02 - Agentes Inteligentes
Aula 01 - Visão Geral da IA
A história da Segurança da Informação
Introdução ao Prolog - Prof. Sérgio S. Costa
Caso 1 - Boing 777
Caso 2 - Aeroporto de Denver
Aula 02 - Agentes e problemas de busca
Aula 01 - Visão geral da IA
Aula 7 - Modelagem de Software
Aula 6 - Qualidade de Software
Aula 07 - Diagrama de sequencia
Aula 06 - Diagrama de classes
Aula 04 - Diagrama de casos de uso
Aula 1 - Introdução a Engenharia de Software
Aula 2 - Modelos de processos
Minicurso de App Inventor
Ad

Recently uploaded (20)

PDF
African Communication Research: A review
PPTX
IT infrastructure and emerging technologies
PPT
hsl powerpoint resource goyloveh feb 07.ppt
PPTX
UNIT_2-__LIPIDS[1].pptx.................
PDF
WHAT NURSES SAY_ COMMUNICATION BEHAVIORS ASSOCIATED WITH THE COMP.pdf
PDF
Kalaari-SaaS-Founder-Playbook-2024-Edition-.pdf
PDF
FYJC - Chemistry textbook - standard 11.
PDF
faiz-khans about Radiotherapy Physics-02.pdf
PDF
BSc-Zoology-02Sem-DrVijay-Comparative anatomy of vertebrates.pdf
PDF
Compact First Student's Book Cambridge Official
PPTX
Q2 Week 1.pptx Lesson on Kahalagahan ng Pamilya sa Edukasyon
PDF
Diabetes Mellitus , types , clinical picture, investigation and managment
PPTX
Theoretical for class.pptxgshdhddhdhdhgd
PDF
Review of Related Literature & Studies.pdf
PPTX
Key-Features-of-the-SHS-Program-v4-Slides (3) PPT2.pptx
PPTX
Cite It Right: A Compact Illustration of APA 7th Edition.pptx
PDF
Chevening Scholarship Application and Interview Preparation Guide
PDF
CAT 2024 VARC One - Shot Revision Marathon by Shabana.pptx.pdf
PDF
CHALLENGES FACED BY TEACHERS WHEN TEACHING LEARNERS WITH DEVELOPMENTAL DISABI...
PDF
Lecture on Viruses: Structure, Classification, Replication, Effects on Cells,...
African Communication Research: A review
IT infrastructure and emerging technologies
hsl powerpoint resource goyloveh feb 07.ppt
UNIT_2-__LIPIDS[1].pptx.................
WHAT NURSES SAY_ COMMUNICATION BEHAVIORS ASSOCIATED WITH THE COMP.pdf
Kalaari-SaaS-Founder-Playbook-2024-Edition-.pdf
FYJC - Chemistry textbook - standard 11.
faiz-khans about Radiotherapy Physics-02.pdf
BSc-Zoology-02Sem-DrVijay-Comparative anatomy of vertebrates.pdf
Compact First Student's Book Cambridge Official
Q2 Week 1.pptx Lesson on Kahalagahan ng Pamilya sa Edukasyon
Diabetes Mellitus , types , clinical picture, investigation and managment
Theoretical for class.pptxgshdhddhdhdhgd
Review of Related Literature & Studies.pdf
Key-Features-of-the-SHS-Program-v4-Slides (3) PPT2.pptx
Cite It Right: A Compact Illustration of APA 7th Edition.pptx
Chevening Scholarship Application and Interview Preparation Guide
CAT 2024 VARC One - Shot Revision Marathon by Shabana.pptx.pdf
CHALLENGES FACED BY TEACHERS WHEN TEACHING LEARNERS WITH DEVELOPMENTAL DISABI...
Lecture on Viruses: Structure, Classification, Replication, Effects on Cells,...

Aula 01 - Fundamentos da segurança dos sistemas de informações

  • 1. © 2012 Jones and Bartlett Learning, LLC www.jblearning.com Fundamentos da segurança dos sistemas de informação Unit 1 Information Systems Security Fundamentals
  • 2. Page 2Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com Learning Objective Explain the concepts of information systems security (ISS) as applied to an IT infrastructure.
  • 3. Page 3Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com Key Concepts § Confidentiality, integrity, and availability (CIA) concepts § Layered security solutions implemented for the seven domains of a typical IT infrastructure § Common threats for each of the seven domains § IT security policy framework § Impact of data classification standard on the seven domains
  • 4. Page 4Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com DISCOVER: CONCEPTS
  • 5. Page 5Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com Introducing ISS ISS Informat ion System s Informat ion
  • 6. Page 6Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com The CIA Triad Confidentiality Integrity Availability
  • 7. Page 7Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com Confidentiality Personal Data and Information • Credit card account numbers and bank account numbers • Social Security numbers and address information Intellectual Property • Copyrights, patents, and secret formulas • Source code, customer databases, and technical specifications National Security • Military intelligence • Homeland security and government-related information
  • 8. Page 8Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com O que estamos protegendo?
  • 9. Page 9Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com Integrity Maintain valid, uncorrupted, and accurate information. § User names and passwords § Patents and copyrights § Source code § Diplomatic information § Financial data
  • 10. Page 10Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com
  • 11. Page 11Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com Availability X X X
  • 12. Page 12Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com Conduct and Ethics in ISS §ISS is a classic battle of “good vs. evil.” §No global laws, rules, or regulations govern cyberspace. §U.S. government and Internet Architecture Board (IAB) have developed joint Internet acceptable use policy (AUP). §Security professionals are in high demand as the “good guys.”
  • 13. Page 13Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com Leis de Conformidade
  • 14. Page 14Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com Compliance Laws Driving ISS Health Insurance Portability and Accountability Act (HIPAA) Sarbanes-Oxley (SOX) Act Children’s Internet Protection Act (CIPA)
  • 15. Page 15Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com IT Security Policy Framework POLICY Standard Procedure Guideline A short written statement that defines a course of action that applies to the entire organization A detailed written definition of how software and hardware are to be used Written instructions for how to use the policy and standard Suggested course of action for using the policy, standard, or procedure
  • 16. Page 16Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com
  • 17. Page 17Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com Seven Domains of a Typical IT Infrastructure
  • 18. Page 18Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com Ciberespaço: uma nova fronteira
  • 19. Page 19Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com
  • 20. Page 20Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com O que está representado na figura?
  • 21. Page 21Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com Common Threats in the User Domain §Lack of user awareness §User apathy toward policies §User violating security policy §User inserting CD/DVD/USB with personal files
  • 22. Page 22Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com Common Threats in the User Domain (Continued) §User downloading photos, music, or videos §User destructing systems, applications, and data §Disgruntled employee attacking organization or committing sabotage §Employee blackmail or extortion
  • 23. Page 23Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com §Unauthorized workstation access §Unauthorized access to systems, applications, and data §Desktop or laptop operating system vulnerabilities §Desktop or laptop application software vulnerabilities or patches Common Threats in the Workstation Domain
  • 24. Page 24Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com §Viruses, malicious code, and other malware §User inserting CD/DVD/USB with personal files §User downloading photos, music, or videos Common Threats in the Workstation Domain (Continued)
  • 25. Page 25Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com Common Threats in the LAN Domain §Unauthorized physical access to LAN §Unauthorized access to systems, applications, and data §LAN server operating system vulnerabilities §LAN server application software vulnerabilities and software patch updates
  • 26. Page 26Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com Common Threats in the LAN Domain (Continued) §Rogue users on WLANs §Confidentiality of data on WLANs §LAN server configuration guidelines and standards
  • 27. Page 27Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com §Unauthorized probing and port scanning §Unauthorized access §Internet Protocol (IP) router, firewall, and network appliance operating system vulnerability §Local users downloading unknown file types from unknown sources Common Threats in the LAN-to-WAN Domain WAN
  • 28. Page 28Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com §Open, public, and accessible data §Most of the traffic being sent as clear text §Vulnerable to eavesdropping §Vulnerable to malicious attacks §Vulnerable to Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks Common Threats in the WAN Domain WAN
  • 29. Page 29Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com §Vulnerable to corruption of information and data §Insecure Transmission Control Protocol/Internet Protocol (TCP/IP) applications §Hackers and attackers e-mailing Trojans, worms, and malicious software freely and constantly Common Threats in the WAN Domain (Continued) WAN
  • 30. Page 30Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com Common Threats in the Remote Access Domain Internet § Brute force user ID and password attacks § Multiple logon retries and access control attacks § Unauthorized remote access to IT systems, applications, and data § Confidential data compromised remotely § Data leakage in violation of data classification standards
  • 31. Page 31Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com Common Threats in the Systems/Applications Domain Cloud Computing § Unauthorized access to data centers, computer rooms, and wiring closets § Difficult-to-manage servers that require high availability § Server operating systems software vulnerability management § Security required by cloud computing virtual environments § Corrupt or lost data
  • 32. Page 32Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com DISCOVER: PROCESSES
  • 33. Page 33Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com Implementing the CIA Triad Confidentiality AUP Security Awareness Policy Enhanced Access Control
  • 34. Page 34Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com Implementing the CIA Triad (Continued) Integrity AUP Security Awareness Policy Enhanced Access Control Threat Assessment and Monitoring Asset Protection Policy Vulnerability Assessment and Management
  • 35. Page 35Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com Implementing the CIA Triad (Continued) Availability AUP Security Awareness Policy Enhanced Access Control Threat Assessment and Monitoring Asset Protection Policy Vulnerability Assessment and Management Data Classification Standard
  • 36. Page 36Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com DISCOVER: ROLES
  • 37. Page 37Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com Who Implements the CIA Triad? Confidentiality Integrity Availability §User §IT administrator §Network administrator §Human resources §Senior management §User §IT administrator §Network administrator §Human resources §Senior management §IT administrator §Network administrator §Third-party vendor
  • 38. Page 38Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com Summary §Terms associated with ISS include risks, threats, and vulnerabilities. §Layered security strategy protects an IT infrastructure’s CIA. §IT policy framework includes policies, standards, procedures, and guidelines. §Data classification standard defines how data is to be handled within an IT infrastructure.