Most common threats to  information security Ana Meskovska [email_address]   ELSA Conference Strumica,  27.11.2008
Contents Introduction What is an information security threat? Information security threats Internet security threats Most common threats, possible consequences and protection Top 10 internet threats
Introduction Information security  means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction through implementation of ISMS i.e. implementation of controls (policies and procedures) the CIA aspect - Confidentiality, Integrity and Availability Computer security  is a branch of technology known as information security as applied to computers. ensuring the availability and correct operation of a computer system
What is an information security threat? A  threat  is any circumstance or event with the potential to harm an information system through unauthorized access, destruction, disclosure, modification of data, and/or denial of service. Threats can be: Natural or Human Deliberate or Accidental
Information security threats People / employees Low awareness for information security aspects Advancing the IT infrastructure, networking and distributive working Improvement of complexity and effectiveness of hackers and viruses Electronic mail (e-mail) Fire, flood, earthquake
Information Security Breaches Survey 2008  1/3 What type of breaches did UK business suffer?
Information Security Breaches Survey 2008 2/3 How many UK businesses have disaster recovery plans? How many UK businesses have disaster recovery plans?
Information Security Breaches Survey 2008 3/3 How did UK businesses address the weakness that   caused their worst incident?
Internet security threats Malware Threat Threats to the Security of E-mail SPAM Associated Threats Social Engineering Threat (Phishing)
Most common internet threats, consequences and protection Malware   threats
Malware threat Malware is software designed to destroy, steal private information or spy on a computer system without the consent of the user. Malwares  - malicious codes, malicious programs or malicious software The most popular categories are Trojan Horses, viruses, adwares, spywares, spams, worms and root kits.
Security  and productivity threats posed by malware Stolen user ID and passwords Unauthorized access to confidential information Loss of intellectual property Remote control of company’s PC Theft of customer data Reduced network performance and bandwidth Increased internet traffic and changes to browser homes pages and search engines
Protection against malwares Good user education is vital in fighting against malwares Keep your operating system up to date by installing OS security fixes and program patches. Use firewall protection Install anti-spyware softwares  Monitor logs for unusual traffic
Most common internet threats, consequences and protection E-mail threats
Threats to the security of e-mail Disclosure of sensitive information Loss of confidentiality Loss of integrity Exposure of systems to malicious code Denial-of-Service (DoS) Unauthorized accesses
Countermeasures to e-mail security Secure the server to client connections POP, IMAP over ssh, SSL https access to webmail Protection against insecure wireless access Secure the end-to-end email delivery The PGPs of the world Still need to get the other party to be PGP aware Practical in an enterprise intra-network environment
When using an e-mail Ensure you are addressing the right person prior to sending email Beware of e-mails from unknown parties (unsolicited e-mails) Do not open unsolicited emails Do not click on links in unsolicited emails Never respond to unsolicited emails  e.g.  ‘ You have won $1,000,000. Kindly send your bank details for crediting your account.’ These are scams also known as social engineering  attacks
Precautions when using a e-mail Suspicious attachments must NOT be opened e.g. Executable files (with .exe, .com, .bat, .reg extensions) Regularly purge unnecessary emails (including emptying the ‘Deleted Items’) to free storage space Do not open/reply to spam messages Avoid registering unnecessarily to mailing lists Use properly configured & regularly updated spam filter, antivirus and antispyware software Use firewall as well
Most common internet threats, consequences and protection SPAM
Security threats from SPAM  SPAM provides a cover for spreading of:  Viruses   Worms  Trojans Spyware Phishing
Countermeasures Spam Filters MS Outlook, Outlook Express…(e.g. SPAMFight) Spamfighter for Outlook and Outlook express Antivirus AVG, Symantec, McAfee, F-Secure, VIRUSfighter…. Antispyware McAfee Antispyware module, S&D , Ad-Adaware SE personal, SPYWAREfighter….
Most common internet threats, consequences and protection Social Engineering Threat (Phishing)
Social Engineering Social engineering  is the art of manipulating people into performing actions or divulging confidential information “ Employees without security awareness are security liabilities.” Gartner Group, 2002
Security threats from phishing Phishing  is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication Use of Email messages and Web pages that are replicas of existing sites to fool users into submitting: personal, financial or password data
Prevention Don't give out personal information Ensure you are on the right website with the right web address Use anti-phishing software – IE7 and Mozilla, McAfee, Firefox 2.0  (includes a form of anti - phishing technology) Research shows that employees who are sensitive and knowledgeable about information security provide the most cost-effective countermeasure against information security violations
Top 10 internet threats
TOP 10 threats SPAM mail  Phishing mail  Wireless attack Hacker attack  Web exploits  Adware Viruses  Spyware/Trojans Identity theft Social engineering
Conclusion Avoid giving unnecessary information online (e.g. subscribing to a newsletter whereby your personal details are requested) Be sure you are dealing with someone or a site that you know and trust before giving out personal information Use regularly updated antivirus and antispyware software Use client filters or ISPs based filters

3 Most Common Threats Of Information Security

  • 1.
    Most common threatsto information security Ana Meskovska [email_address] ELSA Conference Strumica, 27.11.2008
  • 2.
    Contents Introduction Whatis an information security threat? Information security threats Internet security threats Most common threats, possible consequences and protection Top 10 internet threats
  • 3.
    Introduction Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction through implementation of ISMS i.e. implementation of controls (policies and procedures) the CIA aspect - Confidentiality, Integrity and Availability Computer security is a branch of technology known as information security as applied to computers. ensuring the availability and correct operation of a computer system
  • 4.
    What is aninformation security threat? A threat is any circumstance or event with the potential to harm an information system through unauthorized access, destruction, disclosure, modification of data, and/or denial of service. Threats can be: Natural or Human Deliberate or Accidental
  • 5.
    Information security threatsPeople / employees Low awareness for information security aspects Advancing the IT infrastructure, networking and distributive working Improvement of complexity and effectiveness of hackers and viruses Electronic mail (e-mail) Fire, flood, earthquake
  • 6.
    Information Security BreachesSurvey 2008 1/3 What type of breaches did UK business suffer?
  • 7.
    Information Security BreachesSurvey 2008 2/3 How many UK businesses have disaster recovery plans? How many UK businesses have disaster recovery plans?
  • 8.
    Information Security BreachesSurvey 2008 3/3 How did UK businesses address the weakness that caused their worst incident?
  • 9.
    Internet security threatsMalware Threat Threats to the Security of E-mail SPAM Associated Threats Social Engineering Threat (Phishing)
  • 10.
    Most common internetthreats, consequences and protection Malware threats
  • 11.
    Malware threat Malwareis software designed to destroy, steal private information or spy on a computer system without the consent of the user. Malwares - malicious codes, malicious programs or malicious software The most popular categories are Trojan Horses, viruses, adwares, spywares, spams, worms and root kits.
  • 12.
    Security andproductivity threats posed by malware Stolen user ID and passwords Unauthorized access to confidential information Loss of intellectual property Remote control of company’s PC Theft of customer data Reduced network performance and bandwidth Increased internet traffic and changes to browser homes pages and search engines
  • 13.
    Protection against malwaresGood user education is vital in fighting against malwares Keep your operating system up to date by installing OS security fixes and program patches. Use firewall protection Install anti-spyware softwares Monitor logs for unusual traffic
  • 14.
    Most common internetthreats, consequences and protection E-mail threats
  • 15.
    Threats to thesecurity of e-mail Disclosure of sensitive information Loss of confidentiality Loss of integrity Exposure of systems to malicious code Denial-of-Service (DoS) Unauthorized accesses
  • 16.
    Countermeasures to e-mailsecurity Secure the server to client connections POP, IMAP over ssh, SSL https access to webmail Protection against insecure wireless access Secure the end-to-end email delivery The PGPs of the world Still need to get the other party to be PGP aware Practical in an enterprise intra-network environment
  • 17.
    When using ane-mail Ensure you are addressing the right person prior to sending email Beware of e-mails from unknown parties (unsolicited e-mails) Do not open unsolicited emails Do not click on links in unsolicited emails Never respond to unsolicited emails e.g. ‘ You have won $1,000,000. Kindly send your bank details for crediting your account.’ These are scams also known as social engineering attacks
  • 18.
    Precautions when usinga e-mail Suspicious attachments must NOT be opened e.g. Executable files (with .exe, .com, .bat, .reg extensions) Regularly purge unnecessary emails (including emptying the ‘Deleted Items’) to free storage space Do not open/reply to spam messages Avoid registering unnecessarily to mailing lists Use properly configured & regularly updated spam filter, antivirus and antispyware software Use firewall as well
  • 19.
    Most common internetthreats, consequences and protection SPAM
  • 20.
    Security threats fromSPAM SPAM provides a cover for spreading of: Viruses Worms Trojans Spyware Phishing
  • 21.
    Countermeasures Spam FiltersMS Outlook, Outlook Express…(e.g. SPAMFight) Spamfighter for Outlook and Outlook express Antivirus AVG, Symantec, McAfee, F-Secure, VIRUSfighter…. Antispyware McAfee Antispyware module, S&D , Ad-Adaware SE personal, SPYWAREfighter….
  • 22.
    Most common internetthreats, consequences and protection Social Engineering Threat (Phishing)
  • 23.
    Social Engineering Socialengineering is the art of manipulating people into performing actions or divulging confidential information “ Employees without security awareness are security liabilities.” Gartner Group, 2002
  • 24.
    Security threats fromphishing Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication Use of Email messages and Web pages that are replicas of existing sites to fool users into submitting: personal, financial or password data
  • 25.
    Prevention Don't giveout personal information Ensure you are on the right website with the right web address Use anti-phishing software – IE7 and Mozilla, McAfee, Firefox 2.0 (includes a form of anti - phishing technology) Research shows that employees who are sensitive and knowledgeable about information security provide the most cost-effective countermeasure against information security violations
  • 26.
  • 27.
    TOP 10 threatsSPAM mail  Phishing mail  Wireless attack Hacker attack Web exploits  Adware Viruses  Spyware/Trojans Identity theft Social engineering
  • 28.
    Conclusion Avoid givingunnecessary information online (e.g. subscribing to a newsletter whereby your personal details are requested) Be sure you are dealing with someone or a site that you know and trust before giving out personal information Use regularly updated antivirus and antispyware software Use client filters or ISPs based filters

Editor's Notes

  • #4 These differences lie primarily in the approach to the subject, the methodologies used, and the areas of concentration. Information security is concerned with the confidentiality, integrity and availability of data regardless of the form the data may take: electronic, print, or other forms. Computer security can focus on ensuring the availability and correct operation of a computer system without concern for the information stored or processed by the computer.
  • #12 A rootkit is malware which consists of a program (or combination of several programs) designed to take fundamental control (in Unix terms "root" access, in Windows terms, "Administrator" or "Admin" access) of a computer system, without authorization by the system's owners and legitimate managers
  • #16 A denial-of-service attack ( DoS attack ) is an attempt to make a computer resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted, malevolent efforts of a person or persons to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even DNS root servers . Loss of confidentiality E-mails are sent in clear over open networks E-mails stored on potentially insecure clients and mail servers Loss of integrity No integrity protection on e-mails; body can be altered in transit or on mail server
  • #17 POP, IMAP over ssh, SSL – protokoli PGP – enkripcija I dekripcija
  • #21 Viruses Programs that can be attached to emails and are spread as files from individual to individual. Viruses are intentionally destructive Worms Self replicating computers programs, similar to computer viruses however do not require other programs or documents to spread. Trojans non-replicating malicious programs which appears harmless or even useful to the user but when executed harms the user’s System Spyware Programs installed on computers which record and send your personal information – includes marketing info( visited sites, lists of your software, your interests ,etc…) Phishing attempt to fraudulently acquire sensitive information, such as password and financial information, through email or an instant message
  • #24 In computer security, social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures. A social engineer runs what used to be called a "con game". Social Engineering is clever manipulation of the natural human tendency to trust. As a rule, public sector employees care about the jobs they do and try their best to be helpful. “ Social engineering attacks are mostly financially driven, with the attacker looking to obtain confidential information. Some of the common tactics used for such attacks are forging identities, exploiting the inability of people to realize the value of the data held by them or the know-how to protect data. Most users perceive a false sense of security once they install an anti-virus or anti spam solution. That’s why along with providing security solutions, we look to educate our customers on the various current and evolving security threats that take place and how to be immune from them.” said Govind Rammurthy CEO, MicroWorld.