- 1 - Information Security. - 2 - Agenda A Brief History of Internet security What is Security What...
-
Upload
irma-chase -
Category
Documents
-
view
213 -
download
0
Transcript of - 1 - Information Security. - 2 - Agenda A Brief History of Internet security What is Security What...
![Page 1: - 1 - Information Security. - 2 - Agenda A Brief History of Internet security What is Security What I worry about.](https://reader035.fdocuments.us/reader035/viewer/2022070413/5697bfa81a28abf838c998ba/html5/thumbnails/1.jpg)
- 1 -
Information Security
![Page 2: - 1 - Information Security. - 2 - Agenda A Brief History of Internet security What is Security What I worry about.](https://reader035.fdocuments.us/reader035/viewer/2022070413/5697bfa81a28abf838c998ba/html5/thumbnails/2.jpg)
- 2 -
Agenda
• A Brief History of Internet security• What is Security• What I worry about
![Page 3: - 1 - Information Security. - 2 - Agenda A Brief History of Internet security What is Security What I worry about.](https://reader035.fdocuments.us/reader035/viewer/2022070413/5697bfa81a28abf838c998ba/html5/thumbnails/3.jpg)
- 3 -
The Internet
![Page 4: - 1 - Information Security. - 2 - Agenda A Brief History of Internet security What is Security What I worry about.](https://reader035.fdocuments.us/reader035/viewer/2022070413/5697bfa81a28abf838c998ba/html5/thumbnails/4.jpg)
- 4 -
The Internet Worm Incident
• 2 November 1988• Used vulnerabilities in:
• Fingerd
• Sendmail
• ‘r’ commands• Cracked password• Consumed CPU• Aka. ‘The Morris Worm’
![Page 5: - 1 - Information Security. - 2 - Agenda A Brief History of Internet security What is Security What I worry about.](https://reader035.fdocuments.us/reader035/viewer/2022070413/5697bfa81a28abf838c998ba/html5/thumbnails/5.jpg)
- 5 -
Firewalls
![Page 6: - 1 - Information Security. - 2 - Agenda A Brief History of Internet security What is Security What I worry about.](https://reader035.fdocuments.us/reader035/viewer/2022070413/5697bfa81a28abf838c998ba/html5/thumbnails/6.jpg)
- 6 -
Intrusion Detection
![Page 7: - 1 - Information Security. - 2 - Agenda A Brief History of Internet security What is Security What I worry about.](https://reader035.fdocuments.us/reader035/viewer/2022070413/5697bfa81a28abf838c998ba/html5/thumbnails/7.jpg)
- 7 -
DoS and DDoS
![Page 8: - 1 - Information Security. - 2 - Agenda A Brief History of Internet security What is Security What I worry about.](https://reader035.fdocuments.us/reader035/viewer/2022070413/5697bfa81a28abf838c998ba/html5/thumbnails/8.jpg)
- 8 -
Code Red
![Page 9: - 1 - Information Security. - 2 - Agenda A Brief History of Internet security What is Security What I worry about.](https://reader035.fdocuments.us/reader035/viewer/2022070413/5697bfa81a28abf838c998ba/html5/thumbnails/9.jpg)
- 9 -
Broadband
![Page 10: - 1 - Information Security. - 2 - Agenda A Brief History of Internet security What is Security What I worry about.](https://reader035.fdocuments.us/reader035/viewer/2022070413/5697bfa81a28abf838c998ba/html5/thumbnails/10.jpg)
- 10 -
CyberWar and …
![Page 11: - 1 - Information Security. - 2 - Agenda A Brief History of Internet security What is Security What I worry about.](https://reader035.fdocuments.us/reader035/viewer/2022070413/5697bfa81a28abf838c998ba/html5/thumbnails/11.jpg)
- 11 -
… CyberTerrorism
![Page 12: - 1 - Information Security. - 2 - Agenda A Brief History of Internet security What is Security What I worry about.](https://reader035.fdocuments.us/reader035/viewer/2022070413/5697bfa81a28abf838c998ba/html5/thumbnails/12.jpg)
- 12 -
Spy Ware / Ad Ware
![Page 13: - 1 - Information Security. - 2 - Agenda A Brief History of Internet security What is Security What I worry about.](https://reader035.fdocuments.us/reader035/viewer/2022070413/5697bfa81a28abf838c998ba/html5/thumbnails/13.jpg)
- 13 -
CyberCrime
![Page 14: - 1 - Information Security. - 2 - Agenda A Brief History of Internet security What is Security What I worry about.](https://reader035.fdocuments.us/reader035/viewer/2022070413/5697bfa81a28abf838c998ba/html5/thumbnails/14.jpg)
- 14 -
The CIA Triad
ConfidentialitConfidentialityy
IntegritIntegrityy
AvailabiliAvailabilityty
The state of being secretThe state or quality of being entire or complete
Present and ready for use
The state of being secret
The state or quality of being entire or complete
Present and ready for use
= SecuritySecurity
![Page 15: - 1 - Information Security. - 2 - Agenda A Brief History of Internet security What is Security What I worry about.](https://reader035.fdocuments.us/reader035/viewer/2022070413/5697bfa81a28abf838c998ba/html5/thumbnails/15.jpg)
- 15 -
A Definition
Security is a Methodology for Handling Threats to
Confidentiality, Integrity and Availability
- i.e. Risk Management
![Page 16: - 1 - Information Security. - 2 - Agenda A Brief History of Internet security What is Security What I worry about.](https://reader035.fdocuments.us/reader035/viewer/2022070413/5697bfa81a28abf838c998ba/html5/thumbnails/16.jpg)
- 16 -
Things I Worry About
• Users• IT People• IT• Vendors• Nation-State conflict or Terrorists• Email and Web• Mobile Devices• Anyone who thinks that I am responsible for
Information Security
![Page 17: - 1 - Information Security. - 2 - Agenda A Brief History of Internet security What is Security What I worry about.](https://reader035.fdocuments.us/reader035/viewer/2022070413/5697bfa81a28abf838c998ba/html5/thumbnails/17.jpg)
- 17 -
Further Reading
• Bruce Schneier• SANS Internet Storm Centre• SecurityFocus• Titan Rain• Jericho Forum