Ias 102 Week2 5 Lesson
Ias 102 Week2 5 Lesson
2
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 2 - INFORMATION ASSURANCE AND SECURITY OF NETWORKS AND
TELECOMMUNICATIONS
5
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 2 - INFORMATION ASSURANCE AND SECURITY OF NETWORKS AND
TELECOMMUNICATIONS
6
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 2 - INFORMATION ASSURANCE AND SECURITY OF NETWORKS AND
TELECOMMUNICATIONS
7
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 2 - INFORMATION ASSURANCE AND SECURITY OF NETWORKS AND
TELECOMMUNICATIONS
8
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 2 - INFORMATION ASSURANCE AND SECURITY OF NETWORKS AND
TELECOMMUNICATIONS
9
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 2 - INFORMATION ASSURANCE AND SECURITY OF NETWORKS AND
TELECOMMUNICATIONS
10
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 2 - INFORMATION ASSURANCE AND SECURITY OF NETWORKS AND
TELECOMMUNICATIONS
11
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 2 - INFORMATION ASSURANCE AND SECURITY OF NETWORKS AND
TELECOMMUNICATIONS
12
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 2 - INFORMATION ASSURANCE AND SECURITY OF NETWORKS AND
TELECOMMUNICATIONS
13
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 2 - INFORMATION ASSURANCE AND SECURITY OF NETWORKS AND
TELECOMMUNICATIONS
14
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 2 - INFORMATION ASSURANCE AND SECURITY OF NETWORKS AND
TELECOMMUNICATIONS
16
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 2 - INFORMATION ASSURANCE AND SECURITY OF NETWORKS AND
TELECOMMUNICATIONS
17
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 2 - INFORMATION ASSURANCE AND SECURITY OF NETWORKS AND
TELECOMMUNICATIONS
Network Protocol
Govern how networking equipment to
deliver data across the network
18
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 2 - INFORMATION ASSURANCE AND SECURITY OF NETWORKS AND
TELECOMMUNICATIONS
20
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 2 - INFORMATION ASSURANCE AND SECURITY OF NETWORKS AND
TELECOMMUNICATIONS
21
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 2 - INFORMATION ASSURANCE AND SECURITY OF NETWORKS AND
TELECOMMUNICATIONS
22
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 2 - INFORMATION ASSURANCE AND SECURITY OF NETWORKS AND
TELECOMMUNICATIONS
Smurf Attack
ICMP use to create a Denial of
Service attack against network
23
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 2 - INFORMATION ASSURANCE AND SECURITY OF NETWORKS AND
TELECOMMUNICATIONS
24
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 2 - INFORMATION ASSURANCE AND SECURITY OF NETWORKS AND
TELECOMMUNICATIONS
25
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 2 - INFORMATION ASSURANCE AND SECURITY OF NETWORKS AND
TELECOMMUNICATIONS
27
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 2 - INFORMATION ASSURANCE AND SECURITY OF NETWORKS AND
TELECOMMUNICATIONS
Firewall
Virtual Private Network
Network Access Control
29
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 2 - INFORMATION ASSURANCE AND SECURITY OF NETWORKS AND
TELECOMMUNICATIONS
31
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 2 - INFORMATION ASSURANCE AND SECURITY OF NETWORKS AND
TELECOMMUNICATIONS
32
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 2 - INFORMATION ASSURANCE AND SECURITY OF NETWORKS AND
TELECOMMUNICATIONS
Wireless Networks
Wireless Network
Wireless network connect device within a home or offices. It allows
user to work from any locations in the building and many other
devices
33
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 2 - INFORMATION ASSURANCE AND SECURITY OF NETWORKS AND
TELECOMMUNICATIONS
Wireless Networks
Wireless Access Points (WAP’s)
WAP is the connection between a
wired and wireless network
Security Types
Wired Equivalent Privacy (WEP)
Wi-Fi Protected Access (WPA)
Wi-Fi Protected Access II (WPA2)
34
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 2 - INFORMATION ASSURANCE AND SECURITY OF NETWORKS AND
TELECOMMUNICATIONS
Wireless Networks
Wireless Network Security Controls
Use of Encryption to prevent
eavesdropping and adding authentication
to wireless network
Techniques that added security
Wireless Encryption
SSID Beaconing
Mac Address Filtering
35
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
36
WEEK 3-4
MALICIOUS CODE AND ACTIVITIES
2
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 3-4 – MALICIOUS CODE ACTIVITIES
4
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 3-4 – MALICIOUS CODE ACTIVITIES
5
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 3-4 – MALICIOUS CODE ACTIVITIES
6
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 3-4 – MALICIOUS CODE ACTIVITIES
7
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 3-4 – MALICIOUS CODE ACTIVITIES
8
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 3-4 – MALICIOUS CODE ACTIVITIES
9
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 3-4 – MALICIOUS CODE ACTIVITIES
11
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 3-4 – MALICIOUS CODE ACTIVITIES
Worms
Example of worms
ILOVEYOU
Michelangelo
MSBlast
14
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 3-4 – MALICIOUS CODE ACTIVITIES
15
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 3-4 – MALICIOUS CODE ACTIVITIES
16
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 3-4 – MALICIOUS CODE ACTIVITIES
17
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 3-4 – MALICIOUS CODE ACTIVITIES
18
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 3-4 – MALICIOUS CODE ACTIVITIES
19
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 3-4 – MALICIOUS CODE ACTIVITIES
20
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 3-4 – MALICIOUS CODE ACTIVITIES
21
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 3-4 – MALICIOUS CODE ACTIVITIES
22
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 3-4 – MALICIOUS CODE ACTIVITIES
23
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 3-4 – MALICIOUS CODE ACTIVITIES
24
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 3-4 – MALICIOUS CODE ACTIVITIES
25
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 3-4 – MALICIOUS CODE ACTIVITIES
26
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 3-4 – MALICIOUS CODE ACTIVITIES
29
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 3-4 – MALICIOUS CODE ACTIVITIES
30
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 3-4 – MALICIOUS CODE ACTIVITIES
31
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 3-4 – MALICIOUS CODE ACTIVITIES
32
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 3-4 – MALICIOUS CODE ACTIVITIES
33
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 3-4 – MALICIOUS CODE ACTIVITIES
34
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 3-4 – MALICIOUS CODE ACTIVITIES
35
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 3-4 – MALICIOUS CODE ACTIVITIES
36
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 3-4 – MALICIOUS CODE ACTIVITIES
37
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 3-4 – MALICIOUS CODE ACTIVITIES
39
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 3-4 – MALICIOUS CODE ACTIVITIES
Within an Organization
These threat are due to improper or deficient security policy and unsafe user practice
It security practitioner responsibility to understand threat and to implement effective
countermeasures and practices
40
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 3-4 – MALICIOUS CODE ACTIVITIES
41
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 3-4 – MALICIOUS CODE ACTIVITIES
42
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 3-4 – MALICIOUS CODE ACTIVITIES
43
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 3-4 – MALICIOUS CODE ACTIVITIES
Anatomy of Attack
Anatomy of Attack
To understand threats and
developing practical and effective
countermeasures you must
understand the objectives of
malicious code attacks as what
the attackers are targeting.
What motivates attackers
the purpose of an attack
Type of attack
phrases of an attack
45
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 3-4 – MALICIOUS CODE ACTIVITIES
Anatomy of Attack
What Motivates Attackers
Attackers are far more
sophisticated, they have four
primary motivation
They want money
They want to be famous
They want to impose their
political belief or system on
others
They are angry and they want
to exact revenge on those who
angered them
46
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 3-4 – MALICIOUS CODE ACTIVITIES
Anatomy of Attack
Purpose of Attack
Denial of Availability
Data Motivation
Data Export
Launch Point
Types of Attacks
Unstructured Attacks
Structured Attack
Direct Attack
Indirect Attack
47
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 3-4 – MALICIOUS CODE ACTIVITIES
Anatomy of Attack
Phases of Attacks
To develop an attack
Attackers need to know the
target of attack
they develop strategy
attackers are concerned
about not leaving tracks that
allow investigator to identify
them
48
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 3-4 – MALICIOUS CODE ACTIVITIES
Anatomy of Attack
Phases of Attacks
Reconnaissance and
Probing
Access Privilege Escalation
Covering Your Tracks
49
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 3-4 – MALICIOUS CODE ACTIVITIES
50
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 3-4 – MALICIOUS CODE ACTIVITIES
51
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 3-4 – MALICIOUS CODE ACTIVITIES
52
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
53
WEEK 5
2
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 5 : LEGAL, ETHICAL, AND PROFESSIONAL ISSUES IN INFORMATION
TECHNOLOGY
6
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 5 : LEGAL, ETHICAL, AND PROFESSIONAL ISSUES IN INFORMATION
TECHNOLOGY
Relevant U.S. Laws
General Computer Crime Laws
The severity of the penalty Web
depends on the value of
information obtained of
For purpose of commercial
advantage Profit
For private financial gain
In further of a criminal act
7
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 5 : LEGAL, ETHICAL, AND PROFESSIONAL ISSUES IN INFORMATION
TECHNOLOGY
8
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 5 : LEGAL, ETHICAL, AND PROFESSIONAL ISSUES IN INFORMATION
TECHNOLOGY
10
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 5 : LEGAL, ETHICAL, AND PROFESSIONAL ISSUES IN INFORMATION
TECHNOLOGY
Relevant U.S. Laws
Privacy
Identity Theft
the illegal use of someone else’s
personal information like;
Name
Social security number
Credit card number
11
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 5 : LEGAL, ETHICAL, AND PROFESSIONAL ISSUES IN INFORMATION
TECHNOLOGY
Relevant U.S. Laws
12
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 5 : LEGAL, ETHICAL, AND PROFESSIONAL ISSUES IN INFORMATION
TECHNOLOGY
13
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 5 : LEGAL, ETHICAL, AND PROFESSIONAL ISSUES IN INFORMATION
TECHNOLOGY
Relevant U.S. Laws
U.S. Copyright Law
Intellectual Property
refers to creations of the mind;
inventions; literary and artistic work; and
symbols, names and images used in
commerce
Four primary types of intellectual
property
Patents
Trademark
Copyright
Trade Secrets
Rights of Publicity
14
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 5 : LEGAL, ETHICAL, AND PROFESSIONAL ISSUES IN INFORMATION
TECHNOLOGY
Relevant U.S. Laws
U.S. Copyright Law
Extends privilege to the published word
Fair use allows copyright materials to be used to support
news reporting
teaching
scholarship and
as long as use for educational
or library purposes
15
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 5 : LEGAL, ETHICAL, AND PROFESSIONAL ISSUES IN INFORMATION
TECHNOLOGY
16
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 5 : LEGAL, ETHICAL, AND PROFESSIONAL ISSUES IN INFORMATION
TECHNOLOGY
Relevant U.S. Laws
Freedom of Information Act of
1966 (FOIA)
FOIA is a federal law that
generally provides that any
person has right enforceable
in court, to obtain access to
federal agency records
17
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 5 : LEGAL, ETHICAL, AND PROFESSIONAL ISSUES IN INFORMATION
TECHNOLOGY
19
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 5 : LEGAL, ETHICAL, AND PROFESSIONAL ISSUES IN INFORMATION
TECHNOLOGY
International Laws and Legal Bodies
Council of Europe Convention on Cybercrime
Convention on Cybercrime in 2001
Created an international task force to oversee
a range of security function associated with
internet
Emphasize prosecution for copy of
information for law
Acquisition of information for law
enforcement agencies in certain types of
international crimes
20
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 5 : LEGAL, ETHICAL, AND PROFESSIONAL ISSUES IN INFORMATION
TECHNOLOGY
21
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 5 : LEGAL, ETHICAL, AND PROFESSIONAL ISSUES IN INFORMATION
TECHNOLOGY
22
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 5 : LEGAL, ETHICAL, AND PROFESSIONAL ISSUES IN INFORMATION
TECHNOLOGY
23
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 5 : LEGAL, ETHICAL, AND PROFESSIONAL ISSUES IN INFORMATION
TECHNOLOGY
Ethics and Information Security
Ethical Differences Across
Cultures
Ethical Decision
Evaluation
Ethics and Education
Deterring Unethical and
Illegal Behavior
24
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 5 : LEGAL, ETHICAL, AND PROFESSIONAL ISSUES IN INFORMATION
TECHNOLOGY
26
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 5 : LEGAL, ETHICAL, AND PROFESSIONAL ISSUES IN INFORMATION
TECHNOLOGY
27
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 5 : LEGAL, ETHICAL, AND PROFESSIONAL ISSUES IN INFORMATION
TECHNOLOGY
28
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 5 : LEGAL, ETHICAL, AND PROFESSIONAL ISSUES IN INFORMATION
TECHNOLOGY
30
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 5 : LEGAL, ETHICAL, AND PROFESSIONAL ISSUES IN INFORMATION
TECHNOLOGY
Key U.S. Federal Agencies
Key U.S. Federal Agencies
U.S. federal agencies are charged with
the protection of American Information
resources and the investigation of
threats to, or attacks on, these
resources
The Department of Homeland security
(DHS)
National Security Agency (NSA)
31
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
WEEK 5 : LEGAL, ETHICAL, AND PROFESSIONAL ISSUES IN INFORMATION
TECHNOLOGY
REFERENCES:
Knapp, Kenneth J.(2009) Cyber security and global information assurance: threat analysis and response solutions
(advances in information security and privacy)
Lynn, Theo (et.al) (2021) Data privacy and trust in cloud computing: building trust in the cloud through assurance and
accountability
Principles of Information Security 4th edition Michael E. Whitman, Herbert j. Mattord
Sinha, Sanjib (2018) Beginning ethical hacking with Kali Linux: computational techniques for resolving security issues
Stewart, James Michael (et.al) (ISC)2 certified information systems security professional official study guide
Whitman, Michael E. and Mattord, Herbert J. (2018) Principles of information security (6th ed.)
32
IAS102 – INFORMATION ASSURANCE AND SECURITY 2
33