information society security risks. attacks origin consequences risks

32
Information Society Security Risks

Post on 18-Dec-2015

223 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Information Society Security Risks.  Attacks  Origin  Consequences RISKS

Information SocietySecurity Risks

Page 2: Information Society Security Risks.  Attacks  Origin  Consequences RISKS
Page 3: Information Society Security Risks.  Attacks  Origin  Consequences RISKS

Attacks

Origin

Consequences

RISKS ...

Page 4: Information Society Security Risks.  Attacks  Origin  Consequences RISKS

The Attacks

Availability

Integrity

Confidentiality

Page 5: Information Society Security Risks.  Attacks  Origin  Consequences RISKS

The Origin

• ACCIDENTS Physical Accidents Breakdowns Loss of essential service Force majeure

• ERRORS Operational, conceptual or implementation errors

• MALEVOLENCY Theft - Sabotage Fraud Logical Attacks Dispersion

Page 6: Information Society Security Risks.  Attacks  Origin  Consequences RISKS

The Consequences

• Direct and indirect losses

• Material and immaterial losses

• Supplementary Expenses and operational losses

• Losses of assets ( goods , money )

• Civil responsibility

• Sabotage of the enterprise operations

• Injure the business image

• Damage the competitive capability

Page 7: Information Society Security Risks.  Attacks  Origin  Consequences RISKS

Risk Management Prevention

Protection

Detection

After incident recovery

Transfer to insurance

Repression

Page 8: Information Society Security Risks.  Attacks  Origin  Consequences RISKS

The RISKS

Major Dead or alive

unacceptable

insurance inadequate

Minor probability of

incident x severity temporary

acceptable prevention and/or

insurance

Page 9: Information Society Security Risks.  Attacks  Origin  Consequences RISKS

Types of Problems

Intrusion

Viruses

Quality of information

Confidentiality

Intellectual rights

Criminality - security

Page 10: Information Society Security Risks.  Attacks  Origin  Consequences RISKS

Who is responsible ?

Who is the organizer ?

How identify the actors ?

Law applicable ?

Questions

Page 11: Information Society Security Risks.  Attacks  Origin  Consequences RISKS

Intrusion

Alteration Destruction Access - theft

data

programs

Theft of resources

Page 12: Information Society Security Risks.  Attacks  Origin  Consequences RISKS

Who can use the INTERNET ?

What can they do on the INTERNET ?

Who authorizes ?

How can it be controlled?

INTERNET Usage Politics

Page 13: Information Society Security Risks.  Attacks  Origin  Consequences RISKS

Protection against Intrusion

• Barriers (firewalls)

• Access Control

– identification– authentication signature – authorization classification

• Cost calculation

• Access Journalisation

Page 14: Information Society Security Risks.  Attacks  Origin  Consequences RISKS

Methods of Violation

CLASSICpass-word attacks

brute force

encryption and comparisons

social engineering

Page 15: Information Society Security Risks.  Attacks  Origin  Consequences RISKS

Methods of Violation (cont)

MODERNinterception of dataEthernet sniffingKeyboard Logging Monitoring X-WindowsModified Utilities (login, in.telnetd, in.ftpd,

finger, ...)Attacks based on protocols

Encapsulated or wrong configured utilities (NIS, NFS, TELNET, FTP, WWW, R-commands, Sendmail, …)

Page 16: Information Society Security Risks.  Attacks  Origin  Consequences RISKS

FIREWALLS

Everything that is not permitted is forbidden ?

Everything that is not forbidden is allowed ?

All the incoming and outgoing traffic should pass the firewall !

Page 17: Information Society Security Risks.  Attacks  Origin  Consequences RISKS

Limitations of FIREWALLS

Session-jackingof a connected and authorized user

Tunnelinterfere with an authorized traffic

Circumventionusage of an alternative access

Weaknesses of certain applications

Page 18: Information Society Security Risks.  Attacks  Origin  Consequences RISKS

Problems with FIREWALLS

Reduction of the network throughput

Recovery in case of breakdowns Not 100 % reliable Generate a blind confidence Insufficient Installation Tests Permanent Upgrades required The danger is not only external Logs control work Static defense

Page 19: Information Society Security Risks.  Attacks  Origin  Consequences RISKS

Protection against Alteration

• Seal (electronic seal)

Protection against destruction

• Safety copies

Page 20: Information Society Security Risks.  Attacks  Origin  Consequences RISKS

VIRUSES

Impossible to avoid

The ideal antidote does not exists

The viruses grow in number and complexity

Decontamination is a highly specialized job

Page 21: Information Society Security Risks.  Attacks  Origin  Consequences RISKS

QUALITY of INFORMATION

Newspapers have degenerated.

They may now be absolutely relied upon.

Oscar Wilde (1856-1900).

Page 22: Information Society Security Risks.  Attacks  Origin  Consequences RISKS

Data Reliability

Page 23: Information Society Security Risks.  Attacks  Origin  Consequences RISKS

Access Control

Encryption

symmetric keysasymmetric keys

Page 24: Information Society Security Risks.  Attacks  Origin  Consequences RISKS

Encryption

IndividualSociety

Legal Status of encryption ?

Page 25: Information Society Security Risks.  Attacks  Origin  Consequences RISKS

INFORMATION BATTLE

Espionage

Industrial Espionage

Criminality

Terrorism

Page 26: Information Society Security Risks.  Attacks  Origin  Consequences RISKS

Information Highway and Society

• Cost of access and usage

• Info-poors and info-riches

• Contents surveillance

• Impose access restrictions

Page 27: Information Society Security Risks.  Attacks  Origin  Consequences RISKS

Code of conduct

Censure ?

Regulation

‘sensitive Information’ via the information highway

Page 28: Information Society Security Risks.  Attacks  Origin  Consequences RISKS

Protection of intellectual rights

Serial number

Copyright registration

Encryption

Product marks

Page 29: Information Society Security Risks.  Attacks  Origin  Consequences RISKS

Private life protection

Page 30: Information Society Security Risks.  Attacks  Origin  Consequences RISKS

ELECTRONIC COMMERCE

PARTY AUTHENTICATION

AUTHORIZATION

CONFIDENTIALITY

INTEGRITY - NON ALTERATION

JOURNALISATION

NON REFUSION at EMISSION and at RECEPTION

Page 31: Information Society Security Risks.  Attacks  Origin  Consequences RISKS

SECURITY is and will always be in the first place a HUMAN PROBLEM!

Page 32: Information Society Security Risks.  Attacks  Origin  Consequences RISKS

Not connecting is the only 100 % security