Assignment - Computer Science
Read Chapter  1 and 2 of your textbook and reputable resources and write 2/3 page summary and describe the following: What is risk analysis and threat definition? Explain What is being protected? What are the threats? Where are the weaknesses that may be exploited? Explain at least three(3) types of attacks  and how they impact organizational data/resources?. 1 INST569: Data and System Security Lecture 1 Copyright © 2013 University of North America. All rights reserved. Copyright © 2013 University of North America. All rights reserved. Disciplines in Security Management Security Architectures & Models Applications & Systems Development Security Operations Security Physical Security Telecommunications & Network Security Security Management Laws, Investigations & Ethics Business Continuity Planning Cryptography Access Control Systems & Methodologies Copyright © 2013 University of North America. All rights reserved. 2 Security Management Security Management is defined as? Identification of an organization’s information assets Development, documentation and implementation Align people, process and technology to meet organization’s confidentiality, integrity and availability objectives Technology People Process Balanced Aligned Applied Copyright © 2013 University of North America. All rights reserved. 3 Security Management - Objectives Key Objective Reduce the effects of security threats and vulnerabilities to a level that is tolerable All levels of the organization (personnel) understand their security-related responsibilities Access controls should support the principles of least privilege and separation of duties Emerging Objectives Demonstrate due diligence and support objective oversight over information processes and electronic evidence. Support the extension of the organization’s capabilities to address needs and opportunities Copyright © 2013 University of North America. All rights reserved. 4 Security Management - Concepts Key Requirements Confidentiality Integrity Availability Related Concepts Privacy Identification Authentication Authorization Accountability Non-repudiation Documentation Conflicts of Interest Due Diligence Threat Vulnerability Risk Copyright © 2013 University of North America. All rights reserved. 5 Security Management – Concepts (cont.) Separation/Segregation of Duties The principle of separating of duties is that an organization should carefully separate duties, so that people involved in checking for inappropriate use are not also capable of make such inappropriate use. Least-Privileges The principle of least privilege is that users should not have access to information or capabilities beyond those requirement to complete their function. What does this mean in practice? No person should be responsible for completing a task involving sensitive, valuable or critical information from beginning to end. Likewise, a single person must not be responsible for approving their own work. No person should have more access then they require. Copyright © 2013 University of North America. All rights reserved. 6 Security Management – Concepts (cont.) Functional Separation Sales/Engineering Design/Development Development/Production Development/Test Security/Audit Accounts Payable/Accounts Receivable Encryption Key Management/Changing of Keys Split Knowledge Encryption keys are separated into two components, each of which does not reveal the other Copyright © 2013 University of North America. All rights reserved. 7 General Roles Executive Management Have overall responsibility for security. Chief Information Security Officer Responsible for the overall security infrastructure including strategy, design, implementation and support. Information Systems Security Professionals Responsible for design, implementation, management, and review of the organization’s security policy, standards, measures, practices, procedures and controls Data Owners Responsible for determining sensitivity or classification levels of the data as well as maintaining accuracy and integrity of the data resident on the information system. Copyright © 2013 University of North America. All rights reserved. 8 General Roles (cont.) Process Owners Responsible for ensuring the appropriate security, consistent with the security policy, is embedded in their info systems. Technology Providers Responsible for assisting with the implementation of information security. Users Responsible for following the policies and procedures set out in the organization’s security policy. Information Systems Auditors Responsible to provide independent assurance to management on the appropriateness of the security objectives, and on whether the security policies, standards, measures, practices, and procedures are appropriate and comply with the company’s security objectives Copyright © 2013 University of North America. All rights reserved. 9 IS Responsibilities & Functions Establish & Maintain Security Program Develop/implement policies, procedures, guidelines and standards Maintain resource access controls Provide guidance on distributed processing & telecommunications security issues Conduct security awareness training Provide risk analysis services Support vulnerability management activities Support the investigation of incidents Provide EDP audit coordination Support Network/System/Application Design and Verification Process Manage Projects Prepare Business Cases Other areas to address: Employment practices Background investigations Hiring and Termination Practices Copyright © 2013 University of North America. All rights reserved. 10 Security Awareness People often the weakest link in security chain Must be driven from the top-down Must be comprehensive, all the way down to the floppy & hard copies Education Hard Copies Web-Based Training & Education Emerging Trend – Driven by Regulation - Continuous, Assessed and Verified - Others? Copyright © 2013 University of North America. All rights reserved. 11 IS Engineer Critical Success Factors Project Management Business Development IS Analyst Contemporary IS Organization Executive Management Stakeholders Copyright © 2013 University of North America. All rights reserved. 12 Primary Functions Security Policy Management (Governance) Risk Analysis Data/Information Classification Copyright © 2013 University of North America. All rights reserved. 13 Security Governance (Policy Management) Policies – High-level statements that provide broad direction and signify management’s goals and intentions Standards – More specific statements that represent a set of requirements needed to establish organizational controls (compulsory) Guidelines – Non-binding suggestions for compliance with standards (non-compulsory) Procedures – Step-by-step method to implement requirements of policies and standards (work instructions) Senior Management Statement of Policy General Organizational Policies Functional Policies Detailed Procedures Guidelines Standards Tech. Baselines Copyright © 2013 University of North America. All rights reserved. 14 Regulatory Requirements Legal issues often drive an organization’s Information Security practices. Three key pieces of legislation are as follows: Gramm-Leach-Bliley (GLB) Act (effective July 1, 2001), Privacy of Consumer Financial Information. This Act sets the restrictions for financial institutions on when they may disclose a consumers’ personal financial information to non-affiliated third parties. Health Insurance Portability and Accountability Act (HIPAA) of 1996 (Privacy compliance required by April 14, 2003; Security compliance required by April 20, 2005). This Act states that all healthcare providers must ensure the privacy of patient information; employ appropriate security controls to support confidentiality, integrity and availability. Sarbanes-Oxley Act (Section 404) of 2002. This act requires corporate management of publicly traded companies to issue a report on the adequacy and effectiveness of its internal controls, based on documentation and substantive testing/verification. Copyright © 2013 University of North America. All rights reserved. Common Standards & Criteria Framework FISCAM Clinger-Cohen COBIT ISO 900X ISO 17799 HIPAA GLB SOA FERC/NERC Copyright © 2013 University of North America. All rights reserved. Policy Implementation General Process Identify Purpose Set objectives Assign responsibility Provide resources Allocate staff Implement using standards, procedures & guidelines Types of Policies Access Controls Use Of Computing Resources Micro Computing Networking Telecommunications Safeguarding Sensitive Information Disaster Recovery Emergency Notification Records Retention Copying Copyrighted Publications/Software Data classification Media Disposal Other Activities? - Cost/Benefit/Impact Assessment - Enforcement Considerations - User Access and maintenance - Compliance Monitoring Copyright © 2013 University of North America. All rights reserved. 17 Security Governance Example Enterprise Systems Baselines Policies Standards Dev Exceptions Policy Management Policy Procedure Standards SOP’s TSR’s Compliance Monitoring Tool Intranet Update Process Remove, Add, Update Exception Handling Users Policy, Standards, TSR’s User Accounts, Roles and Access Web Standards Exception Management Access Management Control Criteria Copyright © 2013 University of North America. All rights reserved. 19 Risk Management What is Risk Management? To mitigate risk which means reducing risk until it reaches an acceptable level. It is forward looking and serves to identify and assess potential threats to an organization and its information Who defines what an acceptable level of risk is? Can risk be eliminated or reduced completely? What are the main components of risk management? 1. Identification 2. Analysis 3. Control 4. Minimization of loss Copyright © 2013 University of North America. All rights reserved. 19 Key Risk Management Activities Risk Analysis Vulnerability Assessment Security Management Business Copyright © 2013 University of North America. All rights reserved. 20 Summary of Overall Approach Identify what you’re protecting yourself from; then select an appropriate security strategy A risk management answers fundamental questions: Identify assets - What I am trying to protect? Identify risks/threats - What do I need to protect against? Prioritize risks – Which risks are most critical to protect against? Measure/define impacts – What could happen if the risk materializes? Determine costs/benefits - How much time, effort & money am I willing to expend to obtain adequate protection? After risks are determined, develop/revise: the policies & procedures needed to support the reduction of risks define detective, preventive or corrective safeguards (controls) to mitigate the risk (high level) Identify solutions with high likelihood of success for the organization. Copyright © 2013 University of North America. All rights reserved. 21 Data/Information Classification What is a data classification? process driven activity that categorizes organizational information, for the purpose of managing and monitoring its usage, transmittal, storage and disposal, and the safeguards to ensure its protection. When is data or information classification necessary? prioritizes the data that needs to be protected authorized or unauthorized disclosure has an impact on the tangible or intangible assets of the organization or the mission it serves. What are data classification’s objectives? General Minimize information risks like destruction, alteration or disclosure Government Avoid unauthorized disclosure Comply with privacy law Commercial Maintain competitive edge Protect legal tactics Comply with laws Copyright © 2013 University of North America. All rights reserved. 22 Roles and Models Owners Responsible for security Determine sensitivity/criticality Custodians Possess information Implement/administer controls IAW owner’s instructions Users Access data Need to know basis Comply with controls Government: Top Secret Secret Confidential Unclassified Commercial: Eyes only For Internal Use Only Company confidential Public Copyright © 2013 University of North America. All rights reserved. Leading Practices – Security Management Keeping the business risks associated with information systems under control within an enterprise requires clear direction from executive management, allocation of adequate resources, effective arrangement for promoting good information security practices across the enterprise. Management Commitment Security policy Personnel policies Established security organization – with accountability Technical competency Routine and special security awareness and education program Data security and value classification Accountability/ownership assignment On-going risk analysis program Established and current standards, procedures Layered security architecture Complete physical protections Business continuity program Ongoing monitoring Management review and oversight Copyright © 2013 University of North America. All rights reserved. 24 Integrated Information Security Framework Copyright © 2013 University of North America. All rights reserved. 25 Information Security - Defined Information Security is ? Protection of classified information that is stored on computers or transmitted by radio, telephone teletype, or any other means. The protection of information against unauthorized disclosure, transfer modification, or destruction, whether accidental or intentional. The protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users or the provision of service to unauthorized users, including those measures necessary to detect, document, and counter such threats. Ideal Attributes (Good) Enabling, cost effective, contemporary Unfortunate Attributes (Bad) Cost of doing business, restrictive, overly complex, administratively burdensome Avoidable Attributes (Ugly) Ineffective, does not support business requirements What does business expect from information security? Copyright © 2013 University of North America. All rights reserved. Challenges and Barriers Where do security professionals typically fail? Understanding the impact and implication of security on business and operations Integrating the security engineering lifecycle with the IT development lifecycle Positioning the need or case for change in terms that the business can understand Working with management to develop and implement the process for change Standard Conventions to dispel Information security viewed as a cost vs. enabler Approached as a ‘religion not a business-driven function Emphasis just on technology, less on people, organization and process Copyright © 2013 University of North America. All rights reserved. Approaches to Security There are many ways to address the application of security to contemporary organizations: the method or approach needs to be selected, one size does not fit all. There are approaches to address a security need or requirement that do not involve technology. The important aspect of this is understanding the implications of the approach to a particular business. In some regards, it is the difference between being a security professional and a security product/service vendor. Awareness and understanding of the scope of security have evolved over the past forty years. Each advancement added additional insights and features of security that addressed business and operational considerations. Copyright © 2013 University of North America. All rights reserved. Evolution of Information Security 1970 1980 1983 1988 1995 Computer Security Data Security Information Security Information System Security Enterprise Protection Industrial Security 1960 Communication Security 200X Enterprise Risk Management Copyright © 2013 University of North America. All rights reserved. 29 Evolution of Information Security There are now ten domains in the Common Body of Knowledge associated with Information Security. Information Security Management plays a central role in integrating the ten domains, but each domain has its specific characteristics and skill requirements. Most information security professionals enter the INFOSEC discipline through one or more areas, and dont typically get experience in integrating their skills until much later in their career. Copyright © 2013 University of North America. All rights reserved. 30 Information Security Disciplines Security Architectures & Models Applications & Systems Development Security Operations Security Physical Security Telecommunications & Network Security Information Security Management Laws, Investigations & Ethics Business Continuity Planning Cryptography Access Control Systems & Methodologies Copyright © 2013 University of North America. All rights reserved. 31 Purpose of Slide Graphically depict the 10 areas of study that will be covered during the next 8 weeks. Objectives/Discussion Points While the arraignment of the domains is somewhat arbitrary, the placement of security management in the center is accurate in illustrating the role, function and interaction of the information security management function. Ask the class – Have they experience in any one or more of the areas? And to specify. Ask the class – if applicable, what is/was the method for introduction or preparation? Ask the class – if applicable, what was the interaction between their area and other areas depicted? Most information security professionals enter the discipline through one or more areas, and don’t typically get experience with the majority until much later in their career. The benefit of this class is that it provides a wide or comprehensive look at the areas, similar to the preparation of a general practitioner in medicine. During the course of the class and the program, it is likely that the students will find one or more area that they wish to specialize in, either in a profession or advanced research. Key Points/Take-Aways or Summary The domains are presented separately, and the degree that the students can recognize and leverage the interactions and dependencies will play a direct role in how they are able to apply the knowledge. Transition to next slide: That said, lets start off the discussion with Security Management {next slide} Security Awareness Aspects of the Contemporary Security Awareness Program Key Points Policy based Mirror’s managements perspective regarding user’s responsibility Component of risk management program Contents Introduces security features and standards for the organization Acceptable Use and Disclosure/policies Addresses security responsibilities and reporting structures Identify and categorizes incidents Establishes reporting procedures Copyright © 2013 University of North America. All rights reserved. 32 Laws Related to Security Many types of legal systems exist Common law Religious law Civil law Common law of the US Three branches Legislative – make statutory laws Administrative – make administrative laws Judicial – make common laws found in courts Copyright © 2013 University of North America. All rights reserved. 33 Compilation of Statutory Law Statutory laws are collected as session laws which are arranged in order of enactment, or as codes that arrange the law according to subject matter. In US law (state and federal), session laws are found in the Statutes at Large (Stat.) and statutory codes are held in the United States Code (U.S.C.). Copyright © 2013 University of North America. All rights reserved. 34 United States Code The USC contains the following elements Code title number Abbreviation for the code (U.S.C.) Statutory section number Date of the edition or supplement Example: “18 U.S.C. § 1001 (1992)” Section 1001 of title 18 in the United States Code is Crimes and Crimial Procedures that many computer crimes are prosecuted under. Computer Fraud and Abuse Act – “18 U.S.C. § 1030 (1986)” Copyright © 2013 University of North America. All rights reserved. 35 Compilation of Administrative Law Arranged chronologically in administrative registers or by subject matter in administrative codes. Federal Register (Fed. Reg.) Code of Federal Regulations (C.F.R.) C.F.R. citations contain Number of C.F.R. title Abbreviation of the code Section number Year of publication Example: “12 C.F.R § 100.4 (1992)” Copyright © 2013 University of North America. All rights reserved. 36 Common Law System Categories Criminal Law – covers crime that violates government laws enacted for the protection of the public. Punishment can be financial penalties and imprisonment. Civil Law – covers crime that results in damage or loss to individuals or organizations. Financial punishment can be inflicted for punitive, compensatory, or statutory damages. Administrative Law – Standards for performance and conduct by government agencies. Punishment can be financial penalties and imprisonment. Copyright © 2013 University of North America. All rights reserved. 37 Common Law Other Categories Intellectual Property Law Patent – legally enforceable right to prevent others from practicing the invention for a period of time (17 years in the US) Copyright – protects ‘original works of authorship’ from reproduction, adaptation, public distribution, and performances of the work. Trade Secret – secures and maintains confidentiality of proprietary technical or business information. Trademark – Establishes a word, name, symbol, etc. to identify goods and distinguish them from others. Information Privacy Law Protection of information about private individuals from disclosure or misuse. Copyright © 2013 University of North America. All rights reserved. 38 Common Law Intellectual property rights Security Techniques to Protect Trade Secrets Numbering Copies Logging Document Issuance Checking Files & Workstations Secure Storage Controlled Distribution Limitations on Copying Contractual Commitments to Protect Proprietary Rights Licensing Agreements with Vendors Liability for Compliance Copyright © 2013 University of North America. All rights reserved. 39 Common Law Information Privacy Law EU law is more strict than US law Principles Data should be collected in accordance with the law Information about an individual cannot be disclosed without permission of the law or individual Records kept should be accurate and up to date Individuals can correct errors in their personal data Individuals can receive a report of data held on them Personal information can only be transferred to locations where equivalent data protection is in place. Copyright © 2013 University of North America. All rights reserved. 40 Common Law Information Privacy (cont) Example: private medical information Healthcare security issues Access controls need more granularity and least privilege Most applications do not incorporate adequate security controls Systems must be accessible to outside partners and members Providing internet access to records Criminal and Civil penalties can be imposed Misuse of information can lead to public perception changing about an organization Copyright © 2013 University of North America. All rights reserved. 41 Common Law Information Privacy (cont) Health Insurance Portability and Accountability Act (HIPAA ) August 21, 1996 Addresses issues of health care privacy in the US. Rights that an individual who is a subject of individually identifiable health information should have Procedures that should be established for the exercise of such rights Uses and disclosures of information that should be authorized or required Copyright © 2013 University of North America. All rights reserved. 42 Common Law Electronic Monitoring Must be conducted in a lawful manner Must be applied in a consistent fashion Enticement – occurs after unauthorized access is gained (honeypot) Entrapment – encourages commission of a crime. Copyright © 2013 University of North America. All rights reserved. 43 Computer Crime Laws Federal Computer Fraud and Abuse Act (Title 18, U.S. Code, 1030) prosecutes for: *Accessing Federal Interest Computer (FIC) to acquire national defense information Accessing an FIC to obtain financial information Accessing an FIC to deny the use of the computer *Accessing an FIC to affect a fraud *Damaging or denying use of an FIC thru transmission of code, program, information or command Furthering a fraud by trafficking in passwords Copyright © 2013 University of North America. All rights reserved. 44 Computer Crime Laws Federal Economic Espionage Act of 1996: Obtaining trade secrets to benefit a foreign entity Electronic Funds Transfer Act: Covers use, transport, sell, receive or furnish counterfeit, altered, lost, stolen, or fraudulently obtained debit instruments in interstate or foreign commerce. Child Pornography Prevention Act of 1996 (CPPA): Prohibits use of computer technology to produce child pornography. Computer Security Act of 1987: Requires Federal Executive agencies to Establish Computer Security Programs. Copyright © 2013 University of North America. All rights reserved. 45 Federal Computer Crime Laws (cont) Electronic Communications Privacy Act (ECPA): Prohibits unauthorized interception or retrieval of electronic communications Fair Credit Reporting Act: Governs types of data that companies may be collected on private citizens & how it may be used. Foreign Corrupt Practices Act: Covers improper foreign operations, but applies to all companies registered with the SEC, and requires companies to institute security programs. Freedom of Information Act: Permits public access to information collected by the Federal Executive Branch. Copyright © 2013 University of North America. All rights reserved. 46 Computer Laws (continued) Civil Law (Tort Law)- Getting sued for damages Damage/Loss to an Individual or Business Type of Punishment Different: No Incarceration Primary Purpose is Financial Restitution Compensatory Damages: Actual Damages, Attorney Fees, Lost Profits, Investigation Costs Punitive Damages: Set by Jury to Punish Offender Statutory Damages: Established by Law Easier to Obtain Conviction: Preponderance of Evidence Impoundment Orders/Writs of Possession: Equivalent to Search Warrant Copyright © 2013 University of North America. All rights reserved. 47 Compensatory - Actual damages, attorney fees, lost profits, investigation costs Punitive - Set by Jury, punish offender Statutory - Damages established by law, violation entitles victim Computer Laws (continued) International Law: Lots of Problems Lack of Universal Cooperation Differences in Interpretations of Laws Outdated Laws Against Fraud Problems with Evidence Admissibility Extradition Low Priority Copyright © 2013 University of North America. All rights reserved. 48 Computer Crime Computer Crime has to be treated as a Separate Category because ordinary rules don’t or can’t apply. Rules of Property: Lack of Tangible Assets Rules of Evidence: Lack of Original Documents Threats to Integrity and Confidentiality: Goes beyond normal definition of a loss Value of Data: Difficult to Measure. Cases of Restitution only for Media Terminology: Statues have not kept pace. Is Computer Hardware “Machinery”? Does Software quality as “Supplies”. Copyright © 2013 University of North America. All rights reserved. 49 Computer Crime (continued) Difficulties in Prosecution Understanding of computer issues: Judges, Lawyers, Police, Jurors Evidence: Lack of Tangible Evidence Forms of Assets: e.g., Magnetic Particles, Computer Time Juveniles: Many Perpetrators are Juveniles Adults Don’t Take Juvenile Crime Seriously Copyright © 2013 University of North America. All rights reserved. 50 Protection for Computer Objects Hardware - Patents Firmware Patents for Physical Devices Trade Secret Protection for Code Object Code Software - Copyrights Source Code Software - Trade Secrets Documentation - Copyrights Copyright © 2013 University of North America. All rights reserved. 51 Corporate Record keeping Accuracy of Computer Records: Potential Use in Court IRS Rules: Inadequate Controls May Impact Audit Findings Labor and Management Relations Collective Bargaining: Disciplinary Actions, Workplace Rules Work Stoppage Limitations on Background Investigations Limitations on Drug and Polygraph Testing Disgruntled Employees Non-Disclosure Requirements Immigration Laws Establishment and Enforcement of Security Rules Management Problems Copyright © 2013 University of North America. All rights reserved. 52 Management Problems (cont) Data Communications: Disclosure through - Eavesdropping and Interception Loss of Confidential Information Outsourcing Issues Contract Review Review of Contractor’s Capabilities Impact of Downsizing Contractor Use of Proprietary Software Copyright … Chapter 2 Risk Analysis Copyright © 2014 by McGraw-Hill Education. Introduction The objective of a security program is to mitigate risks. Mitigating risks does not mean eliminating them; it means reducing them to an acceptable level. What is being protected? What are the threats? Where are the weaknesses that may be exploited? Copyright © 2014 by McGraw-Hill Education. Threat Definition Threat vectors Threat sources and targets Types of attacks Malicious mobile code Advanced Persistent Threats (APTs) Manual attacks Copyright © 2014 by McGraw-Hill Education. Threat Sources Insider threats should be an important consideration in any security program. Security professionals know that many real-world threats come from inside the organization, which is why just building a wall around your trusted interior is not good enough. Copyright © 2014 by McGraw-Hill Education. Threat Vectors Sources Threats Targets Employees Contractors Consultants System integrators Service providers Resellers Vendors Cleaning staff Third-party support Competitors Insiders Terrorists Internet attackers Software Malware Software bugs Accidents Weather Natural causes Theft Loss Exposure Unauthorized changes Deletion (complete) Deletion (partial) Unauthorized addition Fraud Impersonation Harassment Espionage Denial of service Malfunction Corruption Misuse Errors Outages Physical hazards Injury Intellectual property Trade secrets Personally identifiable information Protected health information Financial data Credit card numbers Social Security numbers Documents Computers Peripherals Storage Networks Operating systems E-mail Voice communications Applications Privacy Productivity Health and safety A threat vector is a term used to describe where a threat originates and the path it takes to reach a target. Copyright © 2014 by McGraw-Hill Education. Types of Attacks Threats found in the real world Copyright © 2014 by McGraw-Hill Education. Types of Security Controls Preventative: Block security threats before they can exploit a vulnerability. Detective: Discover and provide notification of attacks or misuse when they happen. Deterrent: Stop people from wanting to violate policy. Corrective: Restore the integrity of data or another asset. Recovery: Restore the availability of a service. Compensative: In a layered security strategy, provide protection even when another control fails. Copyright © 2014 by McGraw-Hill Education. Types of Attacks Malicious Mobile Code Computer viruses Computer worms e-mail worms Trojans Remote access Trojans Zombie Trojans and DDoS attacks Malicious HTML Advanced Persistent Threats (APTs) Manual Attacks Physical attacks Network-layer attacks Application-layer attacks Copyright © 2014 by McGraw-Hill Education. Malicious Mobile Code There are three generally recognized variants of malicious mobile code: viruses, worms, and Trojans. In addition, many malware programs have components that act like two or more of these types, which are called hybrid threats or mixed threats. Lifecycle of malicious mobile code: Find Exploit Infect Repeat Copyright © 2014 by McGraw-Hill Education. Computer Viruses A virus is a self-replicating program that uses other host files or code to replicate. Anatomy of a Virus The damage routine of a virus (or really of any malware program) is called the payload. Payloads can be intentionally destructive, deleting files, corrupting data, copying confidential information, formatting hard drives, and removing security settings. Copyright © 2014 by McGraw-Hill Education. Types of Viruses If the virus overwrites the host code with its own code, effectively destroying much of the original content, it is called an overwriting virus. If the virus inserts itself into the host code, moving the original code around so the host programming still remains and is executed after the virus code, the virus is called a parasitic virus. Viruses that copy themselves to the beginning of the file are called prepending viruses. Viruses that place themselves at the end of a file are called appending viruses. Viruses that appear in the middle of a host file are labeled mid-infecting viruses. Copyright © 2014 by McGraw-Hill Education. Example of an Overwriting Virus Copyright © 2014 by McGraw-Hill Education. Example of a Prepending Parasitic Virus Copyright © 2014 by McGraw-Hill Education. Computer Worms A computer worm uses its own coding to replicate, although it may rely on the existence of other related code to do so. The key to a worm is that it does not directly modify other host code to replicate. Copyright © 2014 by McGraw-Hill Education. E-mail Worms Originates from e-mail The worm first modifies the PC in such a way that it makes sure it is always loaded into memory when the machine starts. Then it looks for additional e-mail addresses to send itself to. Copyright © 2014 by McGraw-Hill Education. Trojans Trojan horse programs, or Trojans, work by posing as legitimate programs that are activated by an unsuspecting user. Copyright © 2014 by McGraw-Hill Education. Remote Access Trojans A RAT becomes a back door into the compromised system and allows the remote attacker to do virtually anything he or she wants to the compromised PC. Copyright © 2014 by McGraw-Hill Education. Zombie Trojans Zombie Trojans infect a host and wait for their originating attacker’s commands telling them to attack other hosts. Copyright © 2014 by McGraw-Hill Education. Malicious HTML Pure HTML coding can be malicious when it breaks browser security zones or when it can access local system files. Copyright © 2014 by McGraw-Hill Education. Advanced Persistent Threats (APTs) The use of sophisticated malware for targeted cybercrime is known as advanced persistent threats (APTs). Usually targeted at businesses and governments Begins with a simple malware attack. “Phones home” to download further malware—reaches out to a command and control server (CnC server) to bring down rootkits, Trojans, RATs, and other sophisticated malware. The RATs open up connections to their CnC servers to be used by their human controllers. Copyright © 2014 by McGraw-Hill Education. Manual Attacks Typical Attacker Scenarios Port-scanning a particular IP subnet, looking for open TCP/IP ports Attempting to identify the host or service by using fingerprinting mechanisms Attempting to compromise the system in such a way as to gain the highest privileged access to the computer Copyright © 2014 by McGraw-Hill Education. Physical Attacks If an attacker can physically access a computer, it’s game over. Copyright © 2014 by McGraw-Hill Education. Network-Layer Attacks Packet Sniffing =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+= 08/02-12:00:44 0:60:8:26:85:D -> 0:40:10:C:9D:D type:0x800 len:0x43 x.x.x.x:1873->x.x.x.x:21 TCP TTL:128 TOS:0x0 ID:53973 IpLen:20 DgmLen:53 DF ***AP*** Seq: 0x1C88EB9C Ack: 0xF308B9B7 Win: 0xFFCD TcpLen: 20 55 53 45 52 20 72 6F 67 65 72 67 0D 0A USER rogerg.. =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+= =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+= 08/02-12:00:46 0:60:8:26:85:D->0:40:10:C:9D:D type:0x800 len:0x43 x.x.x.x:1873->x.x.x.x:21 TCP TTL:128 TOS:0x0 ID:53978 IpLen:20 DgmLen:53 DF ***AP*** Seq: 0x1C88EBA9 Ack: 0xF308B9DA Win: 0xFFAA TcpLen: 20 50 41 53 53 20 70 61 72 72 6F 74 0D 0A PASS parrot.. =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+= Copyright © 2014 by McGraw-Hill Education. Protocol-Anomaly Attacks Network packets that do not follow the intended format and purpose of the protocol. The attacker can either compromise a remote host or network or compromise a confidential network data stream. Network-layer attacks are most often used to get past firewalls and to cause DoS attacks. Copyright © 2014 by McGraw-Hill Education. Application-Layer Attacks Content attacks Buffer overflows Password cracking P2P attacks Man-in-the-middle attacks ARP poisoning MAC flooding DHCP poisoning DNS spoofing ICMP poisoning Wireless attacks Copyright © 2014 by McGraw-Hill Education. Risk Assessment Analyze and categorize the things to be protected and avoided. Facilitate the identification and prioritization of protective elements. Provide a means to measure the effectiveness of the overall security architecture. Copyright © 2014 by McGraw-Hill Education. The Definition of Risk Risk is the probability of an undesired event (a threat) exploiting a vulnerability to cause an undesired result to an asset. Risk = Probability (Threat + Exploit of Vulnerability) × Cost of Asset Damage Annualized Loss (ALE) = Single Loss (SLE) × Annualized Rate (ARO) Copyright © 2014 by McGraw-Hill Education. Summary Threat definition and risk assessment are necessary to focus the security program on the areas that are most important and relevant to the environment. Threat definition should take into account threat vectors that represent the greatest potential harm. Many threat sources and targets need to be considered: Malicious mobile code Advanced persistent threats Manual attacks Once the threats are identified, risks should be analyzed. Risk is a combination of the threats, exploitation of vulnerabilities, and the resulting cost of damage. Based on this analysis, the proper defensive, detective, and deterrent controls can be applied. Copyright © 2014 by McGraw-Hill Education.
CATEGORIES
Economics Nursing Applied Sciences Psychology Science Management Computer Science Human Resource Management Accounting Information Systems English Anatomy Operations Management Sociology Literature Education Business & Finance Marketing Engineering Statistics Biology Political Science Reading History Financial markets Philosophy Mathematics Law Criminal Architecture and Design Government Social Science World history Chemistry Humanities Business Finance Writing Programming Telecommunications Engineering Geography Physics Spanish ach e. Embedded Entrepreneurship f. Three Social Entrepreneurship Models g. Social-Founder Identity h. Micros-enterprise Development Outcomes Subset 2. Indigenous Entrepreneurship Approaches (Outside of Canada) a. Indigenous Australian Entrepreneurs Exami Calculus (people influence of  others) processes that you perceived occurs in this specific Institution Select one of the forms of stratification highlighted (focus on inter the intersectionalities  of these three) to reflect and analyze the potential ways these ( American history Pharmacology Ancient history . Also Numerical analysis Environmental science Electrical Engineering Precalculus Physiology Civil Engineering Electronic Engineering ness Horizons Algebra Geology Physical chemistry nt When considering both O lassrooms Civil Probability ions Identify a specific consumer product that you or your family have used for quite some time. This might be a branded smartphone (if you have used several versions over the years) or the court to consider in its deliberations. Locard’s exchange principle argues that during the commission of a crime Chemical Engineering Ecology aragraphs (meaning 25 sentences or more). Your assignment may be more than 5 paragraphs but not less. INSTRUCTIONS:  To access the FNU Online Library for journals and articles you can go the FNU library link here:  https://www.fnu.edu/library/ In order to n that draws upon the theoretical reading to explain and contextualize the design choices. Be sure to directly quote or paraphrase the reading ce to the vaccine. Your campaign must educate and inform the audience on the benefits but also create for safe and open dialogue. A key metric of your campaign will be the direct increase in numbers.  Key outcomes: The approach that you take must be clear Mechanical Engineering Organic chemistry Geometry nment Topic You will need to pick one topic for your project (5 pts) Literature search You will need to perform a literature search for your topic Geophysics you been involved with a company doing a redesign of business processes Communication on Customer Relations. Discuss how two-way communication on social media channels impacts businesses both positively and negatively. Provide any personal examples from your experience od pressure and hypertension via a community-wide intervention that targets the problem across the lifespan (i.e. includes all ages). Develop a community-wide intervention to reduce elevated blood pressure and hypertension in the State of Alabama that in in body of the report Conclusions References (8 References Minimum) *** Words count = 2000 words. *** In-Text Citations and References using Harvard style. *** In Task section I’ve chose (Economic issues in overseas contracting)" Electromagnetism w or quality improvement; it was just all part of good nursing care.  The goal for quality improvement is to monitor patient outcomes using statistics for comparison to standards of care for different diseases e a 1 to 2 slide Microsoft PowerPoint presentation on the different models of case management.  Include speaker notes... .....Describe three different models of case management. visual representations of information. They can include numbers SSAY ame workbook for all 3 milestones. You do not need to download a new copy for Milestones 2 or 3. When you submit Milestone 3 pages): Provide a description of an existing intervention in Canada making the appropriate buying decisions in an ethical and professional manner. Topic: Purchasing and Technology You read about blockchain ledger technology. Now do some additional research out on the Internet and share your URL with the rest of the class be aware of which features their competitors are opting to include so the product development teams can design similar or enhanced features to attract more of the market. The more unique low (The Top Health Industry Trends to Watch in 2015) to assist you with this discussion.         https://youtu.be/fRym_jyuBc0 Next year the $2.8 trillion U.S. healthcare industry will   finally begin to look and feel more like the rest of the business wo evidence-based primary care curriculum. Throughout your nurse practitioner program Vignette Understanding Gender Fluidity Providing Inclusive Quality Care Affirming Clinical Encounters Conclusion References Nurse Practitioner Knowledge Mechanics and word limit is unit as a guide only. The assessment may be re-attempted on two further occasions (maximum three attempts in total). All assessments must be resubmitted 3 days within receiving your unsatisfactory grade. You must clearly indicate “Re-su Trigonometry Article writing Other 5. June 29 After the components sending to the manufacturing house 1. In 1972 the Furman v. Georgia case resulted in a decision that would put action into motion. Furman was originally sentenced to death because of a murder he committed in Georgia but the court debated whether or not this was a violation of his 8th amend One of the first conflicts that would need to be investigated would be whether the human service professional followed the responsibility to client ethical standard.  While developing a relationship with client it is important to clarify that if danger or Ethical behavior is a critical topic in the workplace because the impact of it can make or break a business No matter which type of health care organization With a direct sale During the pandemic Computers are being used to monitor the spread of outbreaks in different areas of the world and with this record 3. Furman v. Georgia is a U.S Supreme Court case that resolves around the Eighth Amendments ban on cruel and unsual punishment in death penalty cases. The Furman v. Georgia case was based on Furman being convicted of murder in Georgia. Furman was caught i One major ethical conflict that may arise in my investigation is the Responsibility to Client in both Standard 3 and Standard 4 of the Ethical Standards for Human Service Professionals (2015).  Making sure we do not disclose information without consent ev 4. Identify two examples of real world problems that you have observed in your personal Summary & Evaluation: Reference & 188. Academic Search Ultimate Ethics We can mention at least one example of how the violation of ethical standards can be prevented. Many organizations promote ethical self-regulation by creating moral codes to help direct their business activities *DDB is used for the first three years For example The inbound logistics for William Instrument refer to purchase components from various electronic firms. During the purchase process William need to consider the quality and price of the components. In this case 4. A U.S. Supreme Court case known as Furman v. Georgia (1972) is a landmark case that involved Eighth Amendment’s ban of unusual and cruel punishment in death penalty cases (Furman v. Georgia (1972) With covid coming into place In my opinion with Not necessarily all home buyers are the same! When you choose to work with we buy ugly houses Baltimore & nationwide USA The ability to view ourselves from an unbiased perspective allows us to critically assess our personal strengths and weaknesses. This is an important step in the process of finding the right resources for our personal learning style. Ego and pride can be · By Day 1 of this week While you must form your answers to the questions below from our assigned reading material CliftonLarsonAllen LLP (2013) 5 The family dynamic is awkward at first since the most outgoing and straight forward person in the family in Linda Urien The most important benefit of my statistical analysis would be the accuracy with which I interpret the data. The greatest obstacle From a similar but larger point of view 4 In order to get the entire family to come back for another session I would suggest coming in on a day the restaurant is not open When seeking to identify a patient’s health condition After viewing the you tube videos on prayer Your paper must be at least two pages in length (not counting the title and reference pages) The word assimilate is negative to me. I believe everyone should learn about a country that they are going to live in. It doesnt mean that they have to believe that everything in America is better than where they came from. It means that they care enough Data collection Single Subject Chris is a social worker in a geriatric case management program located in a midsize Northeastern town. She has an MSW and is part of a team of case managers that likes to continuously improve on its practice. The team is currently using an I would start off with Linda on repeating her options for the child and going over what she is feeling with each option.  I would want to find out what she is afraid of.  I would avoid asking her any “why” questions because I want her to be in the here an Summarize the advantages and disadvantages of using an Internet site as means of collecting data for psychological research (Comp 2.1) 25.0\% Summarization of the advantages and disadvantages of using an Internet site as means of collecting data for psych Identify the type of research used in a chosen study Compose a 1 Optics effect relationship becomes more difficult—as the researcher cannot enact total control of another person even in an experimental environment. Social workers serve clients in highly complex real-world environments. Clients often implement recommended inte I think knowing more about you will allow you to be able to choose the right resources Be 4 pages in length soft MB-920 dumps review and documentation and high-quality listing pdf MB-920 braindumps also recommended and approved by Microsoft experts. The practical test g One thing you will need to do in college is learn how to find and use references. References support your ideas. College-level work must be supported by research. You are expected to do that for this paper. You will research Elaborate on any potential confounds or ethical concerns while participating in the psychological study 20.0\% Elaboration on any potential confounds or ethical concerns while participating in the psychological study is missing. Elaboration on any potenti 3 The first thing I would do in the family’s first session is develop a genogram of the family to get an idea of all the individuals who play a major role in Linda’s life. After establishing where each member is in relation to the family A Health in All Policies approach Note: The requirements outlined below correspond to the grading criteria in the scoring guide. At a minimum Chen Read Connecting Communities and Complexity: A Case Study in Creating the Conditions for Transformational Change Read Reflections on Cultural Humility Read A Basic Guide to ABCD Community Organizing Use the bolded black section and sub-section titles below to organize your paper. For each section Losinski forwarded the article on a priority basis to Mary Scott Losinksi wanted details on use of the ED at CGH. He asked the administrative resident