Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Introduction to Systems Security (January 11, 2016) © Abdou Illia – Spring 2016 Learning Objectives Discuss state of security threats in the U.S. Discuss how to manage info security Plan-Protect-Respond cycle People-Technology-Policy approach 2 Preventing Security Threats What can you do, as a user of a computer connected to the Internet or as a business having a network that is connected to the Internet, to prevent security threats/attacks from occurring? 3 Preventing Security Threats Use anti-virus software Use software firewall Use hardware/appliance firewall Use Intrusion Defense Systems Use Intrusion Prevention Systems Install OS updates Install applications’ updates Not open file attachments from unknown sources Not click URL in emails from unknown sources Social engineering tests/Mock phishing schemes Awareness training Acceptable computer use policy Password policy Etc. 4 Countermeasures Tools used to thwart attacks Also called safeguards, protections, and controls Types of countermeasures Preventative Detective Corrective Question: Match each of the countermeasures from the previous slide with its type. 5 The Plan-Protect-Respond cycle Figure 2-6 Dominates security management thinking 6 6 How is the book organized? 7 2012/2013 CSI Security Report Survey Summary online Survey conducted by the Computer Security Institute (http://www.gocsi.com). Copy of Survey report on course web site 8 9 Types of attacks: by % of respondents 10 2013 CSI Report (cont.) 11 CSI Survey (cont.) 12 13 Satisfaction with Security Technology (cont.) 14 15 Types of Technology Used (cont.) 16 2014 Sophos Security Threat Report Malware* hosted on websites 17 * Malicious software 2014 Sophos Security Threat Report Malware hosting countries 18 2014 Sophos Security Threat Report Web server’s software affected Web server software Apache IIS SunONE Operating System Computer hardware RAM chip HD Processor Web server computer As of March 2014 Apache served 58% of all web servers Apache available for Microsoft Windows, Novell NetWare and Unix-like OS 19 Summary Questions 1. What is Plan-Protect-Respond? How important is it for information security? 2. What is PTP? 3. What does malware refer to? 4. Systems running Microsoft operating systems are more likely to be attacked than others. T F 5. With Windows OS, you can use IIS or another web server software like Apache. T F 6. What web server software is most affected by web threats today? 20