Académique Documents
Professionnel Documents
Culture Documents
D. Chakravarty,
d_chakravarty@bsnl.co.in
Advanced Level Telecom Training Centre, Ghaziabad
12/19/2013
ALTTC, Ghaziabad
5
Information Security
ISO /IEC: 27001:2013 defines this as the preservation of:
Confidentiality
Ensuring that information is accessible only to those authorized
to have access
Integrity
Safeguarding the accuracy and completeness of information and
processing methods
Availability
Ensuring that authorized users have access to information and
associated assets when required
6
12/19/2013
Confidentiality
Difficult to maintain
Integrity
Difficult to maintain
Availability
8
12/19/2013
Very good
10
Intelligence
Financial Gain
Bragging Rights / trophies
Gaining Access
Thrill
Political Hacktivism
Fun and Games
12/19/2013
12/19/2013
12
Network
OS
Application
Data
13
Security Attacks
Gather Information :ping, dig, finger, tracert
Find vulnerabilities
Start with mild tools
14
15
16
Virus
Worms
Trojan Horses
Bots
Key Loggers
17
12/19/2013
18
12/19/2013
19
12/19/2013
MSBlaster.A
26 days
Patch: MS02-039
Jul. 24, 2002
Slammer
185 days
Patch: MS00-078
Oct.17, 2000
Nimda
336 days
Window
12/19/2013
Vulnerable Configurations
21
Default Accounts
Default Passwords
Un-necessary Services
Remote Access
Logging and Audit Disabled
IT Security Management
1.
2.
3.
4.
22
24
25
26
27
27
28
Security at OS Level
Keep up-to-date Security Patches and update
releases for OS
Install up-to-date Antivirus Software
Harden OS by turning off unnecessary clients,
Services and features
29
30
31
User Management
Password Management
Managing Allocation of Resources to Users
Backup and Recovery
Auditing
Password Management
Password
history
Account
locking
User
Setting up
profiles
Password
expiration
and aging
32
Password
verification
33
34
Auditing
Auditing is the monitoring of selected user data
base actions and is used to :-
35
Assessments
An assessment is a study to locate security vulnerabilities and identify
corrective actions.
An assessment differs from an audit by not having a set of standards to test
against.
It differs from a penetration test by providing the tester with full access to the
systems being tested.
Penetration Testing
A set of procedures designed to bypass the security controls of a system or
organization
Real life test of the organizations exposure to known security threats
Performed to uncover the security weakness of a system
Focuses on exploiting network and systems vulnerabilities that an
unauthorized
user would exploit
36
12/19/2013
Course Name / Topic Name
37
40
41
12/19/2013
THANK YOU!