11
Definiti ons a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system o compensate, partially or fully, for vulnerabilities someone who intentionally attempts to violate security

Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to

Embed Size (px)

Citation preview

Page 1: Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to

DefinitionsDefinitions

a set of actions taken to prevent or minimize adverse consequences to assets

an entity of importance

a weakness in the security system

to compensate, partially or fully, for vulnerabilities

someone who intentionally attempts to violate security

Page 2: Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to

More DefinitionsMore Definitions

an attack has succeeded (causes the security system to fail)

an attempt to exploit vulnerabilities

potential for a breach

probability of a breach in conjunction with the costof the resultant damage

the method, medium mode of delivery for an attack

Page 3: Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to

Security Crash CourseSecurity Crash Course

Page 4: Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to

AuthenticationAuthenticationAuthentication is a process for verifying identity (and possibly ownership).

authentication factorsauthentication factors

To authenticate requires something more than the object being authenticated.

2-factor authentication

Authentication is often followed by ______________.

Page 5: Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to

Complexity yet another hacker advantage

Complexity yet another hacker advantage

__________________ are ever more complex.

__________________ are ever more complex.

__________________are ever more complex.

Page 6: Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to

Common Threats/AttacksCommon Threats/AttacksWhat are they?

virus/worm

spoofing

shoulder surfing

packet sniffing

denial of service (DoS)

malware

replay

Page 7: Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to

What are they?

logic bomb

cracking (password or encryption)

social engineering

session hijacking

spyware & keyloging

bot / DDoS

backdoor

physical theft or vandalism

More Threats/AttacksMore Threats/Attacks

Page 8: Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to

The Goals of MitigationThe Goals of Mitigation

Page 9: Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to

Threat Mitigation MethodsThreat Mitigation MethodsPhysical

authentication device(locks, card readers, biometric scanners, etc.)

surveillance system

Page 10: Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to

Threat Mitigation MethodsThreat Mitigation MethodsNetworkfirewall

security protocol

intrusion detection system (IDS)

honeypot

Page 11: Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to

Threat Mitigation MethodsThreat Mitigation MethodsSoftwarefirewall

encryption (including digital signature)

intrusion detection system (IDS)

authorization system

anti-virus software

backup system

audit/logging

SPAM filter

software upgrade/patch