CTI12318 - Infosec Notes
.docx
keyboard_arrow_up
School
Full Sail University *
*We aren’t endorsed by this school
Course
CTI2318
Subject
Information Systems
Date
Feb 20, 2024
Type
docx
Pages
11
Uploaded by LieutenantResolve13271
Intro to Infosec Notes
Week 1
Lecture Notes
To understand and apply encryption standards to protect data.
To identify and apply network security concepts.
To secure OS against unauthorized programs and users.
To identify and apply risk-management strategies and regulatory compliance requirements related to information security.
Be cautious of using ChatGPT – Professor will know.
Security 501 is what the course is based on but 601 is the most recent.
End of class presentation
Security Issues
10-minute keynote/PowerPoint presentation
Select one of 10 topics in FSO.
Presentation should cover:
o
Overview of the issue
o
Why it is important to cloud security.
o
Compensating controls for the issue (Defense in Depth)
o
Risk to organizations from the issue
Lab 1 – User Security Going to be creating a strong and weak password.
Lab 2 – Patch, Harden, Protect
CIS Controls and CIS Benchmarks
1.1
– In the News – Phishing
$3M Mattel Phishing Scam
Phishing email claimed to be new executive needing a bill to China paid.
Mattel had controls requiring two signoffs that were poorly implemented.
The only reason they recovered the money was a hall conversation and a bank holiday.
How does this impact information security?
$3M is a lot of money.
What should be done?
Double check the sign-off policy.
How could you protect your system?
Multi-faceted problem. Education and technology measures that can be implemented.
1.2
– CIA and Defense in Depth
Confidentiality, Integrity, and Availability
Intro to Infosec Notes
The framework of the mindset required to practice information security as a whole.
Defense in Depth
Creating layered security
o
If one control fails another
may stop the attack
o
“Belt and Suspenders”
o
Fail safe v Fail Open
o
Mixture of controls
Preventative –
preventing an action
from occurring.
Detective –
detecting an action
occurring.
Corrective –
correcting an action
that occurred.
o
Physical, Logical,
Administrative
Locks on doors,
security cameras
Fingerprint readers,
passwords, 2FA
Rules
Castles and Moats
Traditional networks are systems are not defended any different than castles.
Intro to Infosec Notes
Your most important assets are in the middle.
You surround them with as many protections as you can.
How does this change with Software Defined Networks?
What happens when one fails?
1.3
– Passwords
Creating Passwords
Complexity
Length
History
Age
haveibeenpwned.com – check if your email/password has been compromised!
Pass phrase (sentences)
Choose a random sentence, not lyrics. Hackers probably won’t guess it.
Length is more important than complexity. Spaces are considered to be special characters.
Hashing
One-way mathematical function that takes clear text and rewords/redoes it as unreadable data.
Salting
Will add a little more complexity.
Cracking
The process of trying to figure out the password.
Password Managers
Create strong passwords.
Create unique passwords.
Securely store passwords.
Passwords are encrypted.
Keep a password history.
Prevent password reuse.
If not using one, you probably should. Pain to set up, though.
LastPass, KeyPass, OnePass
Will change your passwords for you if you need to.
Maybe don’t use the correct information for security questions. Can use the password manager notes section for this.
1.4
– Online Safety and Phishing Awareness
Online Safety
User behavior is the #1 risk.
o
Phishing, malware, and unauthorized downloads by trusted users
o
Shared passwords
o
Data leakage
Intro to Infosec Notes
o
User awareness
o
Policies
Privacy Badger – extension for blocking tracking, etc.
Ghostery
uBlock Origin
Phishing Awareness
The most dangerous threat
All email cannot be blocked.
Well crafted phishing attempts are nearly impossible to detect.
Things to look out for:
o
Sense of urgency
o
Behavior outside the norm
o
Issue requiring “secrecy.”
o
Links or procedures outside SOP
1.8 – In the News – IoT
IoT Botnet causes internet outage.
o
In October 2016 Dyn was targeted by a botnet that disrupted numerous top Internet destinations.
How does this impact security?
What should be done?
How could you protect your system?
1.9 – Controls and Techniques
You will never know everything that needs to be secured.
The best way to understand controls is to start with a baseline.
Many organizations have reliable resources that can guide you to create security baselines:
o
OWASP Top 10 – Top 10 most found vulnerabilities in a web-based application.
o
DISA STIGS – Guides on how to harden operating systems made by the Department of Defense.
o
SANS Checklists – SANS is a large educational institute.
o
Common Criteria
1.10 – Data Security
Security Concepts
OS Hardening
o
Why harden?
o
What is hardening?
Concept of making yourself harder to attack.
For example – removing or uninstalling features that come preinstalled that are not actually needed.
Lockout, Wipe, Tracking, Encryption
o
The device was stolen, now what?
o
Remote lockout, remote wipe, if encryption is available then use it.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help