CTI12318 - Infosec Notes

.docx

School

Full Sail University *

*We aren’t endorsed by this school

Course

CTI2318

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

11

Uploaded by LieutenantResolve13271

Intro to Infosec Notes Week 1 Lecture Notes To understand and apply encryption standards to protect data. To identify and apply network security concepts. To secure OS against unauthorized programs and users. To identify and apply risk-management strategies and regulatory compliance requirements related to information security. Be cautious of using ChatGPT – Professor will know. Security 501 is what the course is based on but 601 is the most recent. End of class presentation Security Issues 10-minute keynote/PowerPoint presentation Select one of 10 topics in FSO. Presentation should cover: o Overview of the issue o Why it is important to cloud security. o Compensating controls for the issue (Defense in Depth) o Risk to organizations from the issue Lab 1 – User Security Going to be creating a strong and weak password. Lab 2 – Patch, Harden, Protect CIS Controls and CIS Benchmarks 1.1 – In the News – Phishing $3M Mattel Phishing Scam Phishing email claimed to be new executive needing a bill to China paid. Mattel had controls requiring two signoffs that were poorly implemented. The only reason they recovered the money was a hall conversation and a bank holiday. How does this impact information security? $3M is a lot of money. What should be done? Double check the sign-off policy. How could you protect your system? Multi-faceted problem. Education and technology measures that can be implemented. 1.2 – CIA and Defense in Depth Confidentiality, Integrity, and Availability
Intro to Infosec Notes The framework of the mindset required to practice information security as a whole. Defense in Depth Creating layered security o If one control fails another may stop the attack o “Belt and Suspenders” o Fail safe v Fail Open o Mixture of controls Preventative – preventing an action from occurring. Detective – detecting an action occurring. Corrective – correcting an action that occurred. o Physical, Logical, Administrative Locks on doors, security cameras Fingerprint readers, passwords, 2FA Rules Castles and Moats Traditional networks are systems are not defended any different than castles.
Intro to Infosec Notes Your most important assets are in the middle. You surround them with as many protections as you can. How does this change with Software Defined Networks? What happens when one fails? 1.3 – Passwords Creating Passwords Complexity Length History Age haveibeenpwned.com – check if your email/password has been compromised! Pass phrase (sentences) Choose a random sentence, not lyrics. Hackers probably won’t guess it. Length is more important than complexity. Spaces are considered to be special characters. Hashing One-way mathematical function that takes clear text and rewords/redoes it as unreadable data. Salting Will add a little more complexity. Cracking The process of trying to figure out the password. Password Managers Create strong passwords. Create unique passwords. Securely store passwords. Passwords are encrypted. Keep a password history. Prevent password reuse. If not using one, you probably should. Pain to set up, though. LastPass, KeyPass, OnePass Will change your passwords for you if you need to. Maybe don’t use the correct information for security questions. Can use the password manager notes section for this. 1.4 – Online Safety and Phishing Awareness Online Safety User behavior is the #1 risk. o Phishing, malware, and unauthorized downloads by trusted users o Shared passwords o Data leakage
Intro to Infosec Notes o User awareness o Policies Privacy Badger – extension for blocking tracking, etc. Ghostery uBlock Origin Phishing Awareness The most dangerous threat All email cannot be blocked. Well crafted phishing attempts are nearly impossible to detect. Things to look out for: o Sense of urgency o Behavior outside the norm o Issue requiring “secrecy.” o Links or procedures outside SOP 1.8 – In the News – IoT IoT Botnet causes internet outage. o In October 2016 Dyn was targeted by a botnet that disrupted numerous top Internet destinations. How does this impact security? What should be done? How could you protect your system? 1.9 – Controls and Techniques You will never know everything that needs to be secured. The best way to understand controls is to start with a baseline. Many organizations have reliable resources that can guide you to create security baselines: o OWASP Top 10 – Top 10 most found vulnerabilities in a web-based application. o DISA STIGS – Guides on how to harden operating systems made by the Department of Defense. o SANS Checklists – SANS is a large educational institute. o Common Criteria 1.10 – Data Security Security Concepts OS Hardening o Why harden? o What is hardening? Concept of making yourself harder to attack. For example – removing or uninstalling features that come preinstalled that are not actually needed. Lockout, Wipe, Tracking, Encryption o The device was stolen, now what? o Remote lockout, remote wipe, if encryption is available then use it.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help