SlideShare uma empresa Scribd logo
1 de 24
Baixar para ler offline
© 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Fundamentals of Information
Systems Security
Unit 2
Aplicação de contramedidas de
segurança para mitigar ataques
maliciosos
Page 2Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com© 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Learning Objective
Describe how malicious attacks, threats, and
vulnerabilities impact an IT infrastructure.
Page 3Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com© 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Key Concepts
§Attacks, threats, and vulnerabilities in a
typical IT infrastructure
§Common security countermeasures
typically found in an IT infrastructure
§Risk assessment approach to securing an
IT infrastructure
§Risk mitigation strategies to shrink the
information security gap
Page 4Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com
DISCOVER: CONCEPTS
Page 5Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com© 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Definitions
§Risk: Probability that an intentional or
unintentional act will harm resources
§Threat: Any accidental or intentional event
that negatively impacts company resources
§Vulnerability: Inherent weakness that may
enable threats to harm system or networks
Risks, threats, and vulnerabilities affect
confidentiality, integrity, and availability (CIA).
Page 6Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com© 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Atividade Maliciosa por País
Page 7Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com© 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Types of Threats
§Malicious software
§Device failure
§Application failure
§Natural disaster
§Intrusive cracker
Page 8Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com© 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Types of Vulnerabilities
§Insecure servers or services
§Exploitable applications and protocols
§Unprotected system or network resources
§Traffic interception and eavesdropping
§Lack of preventive and protective measures
against malware or automated attacks
Page 9Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com© 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Vulnerabilidades comuns nos 7 domínios
Page 10Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com© 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Alvos de ameça nos 7 domínios
Page 11Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com© 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Page 12Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com© 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Page 13Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com© 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Quem sou eu?
Page 14Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com© 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Identify the Criminal
Criminal Profile #1
§Victimizes people through unsolicited
e-mail messages to get victim’s money
§Does not rely on intrusive methods to
commit crimes
§Is motivated by financial gain
Page 15Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com© 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Golpista da Internet
Page 16Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com© 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Identify the Criminal (Continued)
Criminal Profile #2
§Enters systems without permission to raise
awareness of security issues
§Does not work for the company or its
clients
§Does not intend harm, just tries to be
“helpful”
§Is motivated by impulse
Page 17Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com© 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Gray-hat hacker
Page 18Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com© 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Identify the Criminal (Continued)
Criminal Profile #3
§Engages in illegal black market
transactions on the Internet
§Traffics drugs, weapons, or banned
materials
§Is motivated by financial gain
Page 19Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com© 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Terrorists or traffickers
Page 20Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com© 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Identify the Criminal (Continued)
Criminal Profile #4
§Enters systems without permission to take
advantage of security issues
§Does not work for the company or its
clients
§Does not intend to help, only wants to
cause harm
§Is motivated by peer acceptance
Page 21Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com© 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Black-hat hacker or cracker
Page 22Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com© 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Identify the Criminal (Continued)
Criminal Profile #5
§Intrudes upon systems to verify and
validate security issues
§Works for the company or one of its clients
§Does not intend harm, just tries to be
“helpful”
Page 23Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com© 2012 Jones and Bartlett Learning, LLC www.jblearning.com
White-hat hacker
Page 24Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com© 2012 Jones and Bartlett Learning, LLC www.jblearning.com
Summary
§Threats are controllable.
§Risks are manageable.
§Vulnerabilities are unavoidable.
§All of these negatively affect the CIA
triad.
§Not all threats are intentional.

Mais conteúdo relacionado

Mais procurados

William A. Tanenbaum Association of Benefit Administrators April 2015
William A. Tanenbaum  Association of Benefit Administrators April 2015William A. Tanenbaum  Association of Benefit Administrators April 2015
William A. Tanenbaum Association of Benefit Administrators April 2015
William Tanenbaum
 

Mais procurados (20)

Fundamentals of Information Systems Security Chapter 5
Fundamentals of Information Systems Security Chapter 5Fundamentals of Information Systems Security Chapter 5
Fundamentals of Information Systems Security Chapter 5
 
Fundamentals of Information Systems Security Chapter 12
Fundamentals of Information Systems Security Chapter 12Fundamentals of Information Systems Security Chapter 12
Fundamentals of Information Systems Security Chapter 12
 
Funsec3e ppt ch06
Funsec3e ppt ch06Funsec3e ppt ch06
Funsec3e ppt ch06
 
Approche intégrée de la gestion des risques, de la sécurité de l’information,...
Approche intégrée de la gestion des risques, de la sécurité de l’information,...Approche intégrée de la gestion des risques, de la sécurité de l’information,...
Approche intégrée de la gestion des risques, de la sécurité de l’information,...
 
Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2 Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2
 
Fundamentals of Information Systems Security Chapter 8
Fundamentals of Information Systems Security Chapter 8Fundamentals of Information Systems Security Chapter 8
Fundamentals of Information Systems Security Chapter 8
 
Fundamentals of Information Systems Security Chapter 13
Fundamentals of Information Systems Security Chapter 13Fundamentals of Information Systems Security Chapter 13
Fundamentals of Information Systems Security Chapter 13
 
William A. Tanenbaum Association of Benefit Administrators April 2015
William A. Tanenbaum  Association of Benefit Administrators April 2015William A. Tanenbaum  Association of Benefit Administrators April 2015
William A. Tanenbaum Association of Benefit Administrators April 2015
 
Forensic3e ppt ch03
Forensic3e ppt ch03Forensic3e ppt ch03
Forensic3e ppt ch03
 
Fundamentals of Information Systems Security Chapter 6
Fundamentals of Information Systems Security Chapter 6Fundamentals of Information Systems Security Chapter 6
Fundamentals of Information Systems Security Chapter 6
 
Forensic3e ppt ch13
Forensic3e ppt ch13Forensic3e ppt ch13
Forensic3e ppt ch13
 
Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1
 
Funsec3e ppt ch07
Funsec3e ppt ch07Funsec3e ppt ch07
Funsec3e ppt ch07
 
Key Cyber Security Issues for Government Contractors
Key Cyber Security Issues for Government ContractorsKey Cyber Security Issues for Government Contractors
Key Cyber Security Issues for Government Contractors
 
Fundamentals of Information Systems Security Chapter 11
Fundamentals of Information Systems Security Chapter 11Fundamentals of Information Systems Security Chapter 11
Fundamentals of Information Systems Security Chapter 11
 
Fundamentals of Information Systems Security Chapter 9
Fundamentals of Information Systems Security Chapter 9Fundamentals of Information Systems Security Chapter 9
Fundamentals of Information Systems Security Chapter 9
 
Funsec3e ppt ch11
Funsec3e ppt ch11Funsec3e ppt ch11
Funsec3e ppt ch11
 
Funsec3e ppt ch13
Funsec3e ppt ch13Funsec3e ppt ch13
Funsec3e ppt ch13
 
Fundamentals of Information Systems Security Chapter 4
Fundamentals of Information Systems Security Chapter 4Fundamentals of Information Systems Security Chapter 4
Fundamentals of Information Systems Security Chapter 4
 
Emids Morning Security Virtual India V3
Emids Morning Security Virtual India V3Emids Morning Security Virtual India V3
Emids Morning Security Virtual India V3
 

Semelhante a Aula 02 - Aplicação de contramedidas de segurança para mitigar ataques maliciosos

Fundamentals of Information Systems Security Lesson 3Malic.docx
Fundamentals of Information Systems Security Lesson 3Malic.docxFundamentals of Information Systems Security Lesson 3Malic.docx
Fundamentals of Information Systems Security Lesson 3Malic.docx
shericehewat
 
Security Policies and Implementation IssuesChapter 3U.S. Com.docx
Security Policies and Implementation IssuesChapter 3U.S. Com.docxSecurity Policies and Implementation IssuesChapter 3U.S. Com.docx
Security Policies and Implementation IssuesChapter 3U.S. Com.docx
jeffreye3
 
Security Strategies in Windows Platforms and ApplicationsL.docx
Security Strategies in Windows Platforms and ApplicationsL.docxSecurity Strategies in Windows Platforms and ApplicationsL.docx
Security Strategies in Windows Platforms and ApplicationsL.docx
jeffreye3
 
Security Strategies in Windows Platforms and ApplicationsL.docx
Security Strategies in Windows Platforms and ApplicationsL.docxSecurity Strategies in Windows Platforms and ApplicationsL.docx
Security Strategies in Windows Platforms and ApplicationsL.docx
kenjordan97598
 
Hedna pii is your goldmine a landmine
Hedna   pii is your goldmine a landmineHedna   pii is your goldmine a landmine
Hedna pii is your goldmine a landmine
Evelyne Oreskovich
 
Douglas Jambor Sageworks Cybersecurity Presentation
Douglas Jambor Sageworks Cybersecurity PresentationDouglas Jambor Sageworks Cybersecurity Presentation
Douglas Jambor Sageworks Cybersecurity Presentation
Turner and Associates, Inc.
 
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...
Visa
 

Semelhante a Aula 02 - Aplicação de contramedidas de segurança para mitigar ataques maliciosos (20)

Funsec3e ppt ch03
Funsec3e ppt ch03Funsec3e ppt ch03
Funsec3e ppt ch03
 
Dr_Kamal_ch01.pptx
Dr_Kamal_ch01.pptxDr_Kamal_ch01.pptx
Dr_Kamal_ch01.pptx
 
info-sys-security3.pptx
info-sys-security3.pptxinfo-sys-security3.pptx
info-sys-security3.pptx
 
M7 internet security
M7 internet securityM7 internet security
M7 internet security
 
Fundamentals of Information Systems Security Lesson 3Malic.docx
Fundamentals of Information Systems Security Lesson 3Malic.docxFundamentals of Information Systems Security Lesson 3Malic.docx
Fundamentals of Information Systems Security Lesson 3Malic.docx
 
Security Policies and Implementation IssuesChapter 3U.S. Com.docx
Security Policies and Implementation IssuesChapter 3U.S. Com.docxSecurity Policies and Implementation IssuesChapter 3U.S. Com.docx
Security Policies and Implementation IssuesChapter 3U.S. Com.docx
 
Security Strategies in Windows Platforms and ApplicationsL.docx
Security Strategies in Windows Platforms and ApplicationsL.docxSecurity Strategies in Windows Platforms and ApplicationsL.docx
Security Strategies in Windows Platforms and ApplicationsL.docx
 
Security Strategies in Windows Platforms and ApplicationsL.docx
Security Strategies in Windows Platforms and ApplicationsL.docxSecurity Strategies in Windows Platforms and ApplicationsL.docx
Security Strategies in Windows Platforms and ApplicationsL.docx
 
Safeguarding Data Integrity: A Comprehensive Review of Cyber Data Breaches wi...
Safeguarding Data Integrity: A Comprehensive Review of Cyber Data Breaches wi...Safeguarding Data Integrity: A Comprehensive Review of Cyber Data Breaches wi...
Safeguarding Data Integrity: A Comprehensive Review of Cyber Data Breaches wi...
 
Rcs triumfant watchful_webinar_final
Rcs triumfant watchful_webinar_finalRcs triumfant watchful_webinar_final
Rcs triumfant watchful_webinar_final
 
Data Breach Guide 2013
Data Breach Guide 2013Data Breach Guide 2013
Data Breach Guide 2013
 
Isaca houston presentation 12 4 12
Isaca houston presentation 12 4 12Isaca houston presentation 12 4 12
Isaca houston presentation 12 4 12
 
Five Common Causes of Data Breaches
Five Common Causes of Data Breaches Five Common Causes of Data Breaches
Five Common Causes of Data Breaches
 
cryptography.pptx
cryptography.pptxcryptography.pptx
cryptography.pptx
 
Hedna pii is your goldmine a landmine
Hedna   pii is your goldmine a landmineHedna   pii is your goldmine a landmine
Hedna pii is your goldmine a landmine
 
Douglas Jambor Sageworks Cybersecurity Presentation
Douglas Jambor Sageworks Cybersecurity PresentationDouglas Jambor Sageworks Cybersecurity Presentation
Douglas Jambor Sageworks Cybersecurity Presentation
 
CyberSecurity: Protecting Law Firms - Vanderburg - JurInnov
CyberSecurity: Protecting Law Firms - Vanderburg - JurInnovCyberSecurity: Protecting Law Firms - Vanderburg - JurInnov
CyberSecurity: Protecting Law Firms - Vanderburg - JurInnov
 
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
Data security in a big data environment sweden
Data security in a big data environment   swedenData security in a big data environment   sweden
Data security in a big data environment sweden
 

Mais de Leinylson Fontinele

Mais de Leinylson Fontinele (20)

Utilização do editor de texto Word
Utilização do editor de texto WordUtilização do editor de texto Word
Utilização do editor de texto Word
 
Prática com slide.pptx
Prática com slide.pptxPrática com slide.pptx
Prática com slide.pptx
 
A galinha carijó
A galinha carijóA galinha carijó
A galinha carijó
 
Descrição do Projeto 8 puzzle
Descrição do Projeto 8 puzzleDescrição do Projeto 8 puzzle
Descrição do Projeto 8 puzzle
 
Aula 02 - Agentes Inteligentes
Aula 02 - Agentes InteligentesAula 02 - Agentes Inteligentes
Aula 02 - Agentes Inteligentes
 
Aula 01 - Visão Geral da IA
Aula 01 - Visão Geral da IAAula 01 - Visão Geral da IA
Aula 01 - Visão Geral da IA
 
A história da Segurança da Informação
A história da Segurança da InformaçãoA história da Segurança da Informação
A história da Segurança da Informação
 
Introdução ao Prolog - Prof. Sérgio S. Costa
Introdução ao Prolog - Prof. Sérgio S. CostaIntrodução ao Prolog - Prof. Sérgio S. Costa
Introdução ao Prolog - Prof. Sérgio S. Costa
 
Caso 1 - Boing 777
Caso 1 - Boing 777Caso 1 - Boing 777
Caso 1 - Boing 777
 
Caso 2 - Aeroporto de Denver
Caso 2 - Aeroporto de DenverCaso 2 - Aeroporto de Denver
Caso 2 - Aeroporto de Denver
 
Aula 02 - Agentes e problemas de busca
Aula 02 - Agentes e problemas de buscaAula 02 - Agentes e problemas de busca
Aula 02 - Agentes e problemas de busca
 
Aula 01 - Visão geral da IA
Aula 01 - Visão geral da IAAula 01 - Visão geral da IA
Aula 01 - Visão geral da IA
 
Aula 7 - Modelagem de Software
Aula 7 - Modelagem de SoftwareAula 7 - Modelagem de Software
Aula 7 - Modelagem de Software
 
Aula 6 - Qualidade de Software
Aula 6 - Qualidade de SoftwareAula 6 - Qualidade de Software
Aula 6 - Qualidade de Software
 
Aula 07 - Diagrama de sequencia
Aula 07 - Diagrama de sequenciaAula 07 - Diagrama de sequencia
Aula 07 - Diagrama de sequencia
 
Aula 06 - Diagrama de classes
Aula 06 - Diagrama de classesAula 06 - Diagrama de classes
Aula 06 - Diagrama de classes
 
Aula 04 - Diagrama de casos de uso
Aula 04 - Diagrama de casos de usoAula 04 - Diagrama de casos de uso
Aula 04 - Diagrama de casos de uso
 
Aula 1 - Introdução a Engenharia de Software
Aula 1 -  Introdução a Engenharia de SoftwareAula 1 -  Introdução a Engenharia de Software
Aula 1 - Introdução a Engenharia de Software
 
Aula 2 - Modelos de processos
Aula 2 -  Modelos de processosAula 2 -  Modelos de processos
Aula 2 - Modelos de processos
 
Minicurso de App Inventor
Minicurso de App InventorMinicurso de App Inventor
Minicurso de App Inventor
 

Último

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Último (20)

Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 

Aula 02 - Aplicação de contramedidas de segurança para mitigar ataques maliciosos

  • 1. © 2012 Jones and Bartlett Learning, LLC www.jblearning.com Fundamentals of Information Systems Security Unit 2 Aplicação de contramedidas de segurança para mitigar ataques maliciosos
  • 2. Page 2Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com© 2012 Jones and Bartlett Learning, LLC www.jblearning.com Learning Objective Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.
  • 3. Page 3Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com© 2012 Jones and Bartlett Learning, LLC www.jblearning.com Key Concepts §Attacks, threats, and vulnerabilities in a typical IT infrastructure §Common security countermeasures typically found in an IT infrastructure §Risk assessment approach to securing an IT infrastructure §Risk mitigation strategies to shrink the information security gap
  • 4. Page 4Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com DISCOVER: CONCEPTS
  • 5. Page 5Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com© 2012 Jones and Bartlett Learning, LLC www.jblearning.com Definitions §Risk: Probability that an intentional or unintentional act will harm resources §Threat: Any accidental or intentional event that negatively impacts company resources §Vulnerability: Inherent weakness that may enable threats to harm system or networks Risks, threats, and vulnerabilities affect confidentiality, integrity, and availability (CIA).
  • 6. Page 6Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com© 2012 Jones and Bartlett Learning, LLC www.jblearning.com Atividade Maliciosa por País
  • 7. Page 7Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com© 2012 Jones and Bartlett Learning, LLC www.jblearning.com Types of Threats §Malicious software §Device failure §Application failure §Natural disaster §Intrusive cracker
  • 8. Page 8Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com© 2012 Jones and Bartlett Learning, LLC www.jblearning.com Types of Vulnerabilities §Insecure servers or services §Exploitable applications and protocols §Unprotected system or network resources §Traffic interception and eavesdropping §Lack of preventive and protective measures against malware or automated attacks
  • 9. Page 9Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com© 2012 Jones and Bartlett Learning, LLC www.jblearning.com Vulnerabilidades comuns nos 7 domínios
  • 10. Page 10Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com© 2012 Jones and Bartlett Learning, LLC www.jblearning.com Alvos de ameça nos 7 domínios
  • 11. Page 11Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com© 2012 Jones and Bartlett Learning, LLC www.jblearning.com
  • 12. Page 12Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com© 2012 Jones and Bartlett Learning, LLC www.jblearning.com
  • 13. Page 13Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com© 2012 Jones and Bartlett Learning, LLC www.jblearning.com Quem sou eu?
  • 14. Page 14Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com© 2012 Jones and Bartlett Learning, LLC www.jblearning.com Identify the Criminal Criminal Profile #1 §Victimizes people through unsolicited e-mail messages to get victim’s money §Does not rely on intrusive methods to commit crimes §Is motivated by financial gain
  • 15. Page 15Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com© 2012 Jones and Bartlett Learning, LLC www.jblearning.com Golpista da Internet
  • 16. Page 16Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com© 2012 Jones and Bartlett Learning, LLC www.jblearning.com Identify the Criminal (Continued) Criminal Profile #2 §Enters systems without permission to raise awareness of security issues §Does not work for the company or its clients §Does not intend harm, just tries to be “helpful” §Is motivated by impulse
  • 17. Page 17Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com© 2012 Jones and Bartlett Learning, LLC www.jblearning.com Gray-hat hacker
  • 18. Page 18Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com© 2012 Jones and Bartlett Learning, LLC www.jblearning.com Identify the Criminal (Continued) Criminal Profile #3 §Engages in illegal black market transactions on the Internet §Traffics drugs, weapons, or banned materials §Is motivated by financial gain
  • 19. Page 19Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com© 2012 Jones and Bartlett Learning, LLC www.jblearning.com Terrorists or traffickers
  • 20. Page 20Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com© 2012 Jones and Bartlett Learning, LLC www.jblearning.com Identify the Criminal (Continued) Criminal Profile #4 §Enters systems without permission to take advantage of security issues §Does not work for the company or its clients §Does not intend to help, only wants to cause harm §Is motivated by peer acceptance
  • 21. Page 21Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com© 2012 Jones and Bartlett Learning, LLC www.jblearning.com Black-hat hacker or cracker
  • 22. Page 22Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com© 2012 Jones and Bartlett Learning, LLC www.jblearning.com Identify the Criminal (Continued) Criminal Profile #5 §Intrudes upon systems to verify and validate security issues §Works for the company or one of its clients §Does not intend harm, just tries to be “helpful”
  • 23. Page 23Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com© 2012 Jones and Bartlett Learning, LLC www.jblearning.com White-hat hacker
  • 24. Page 24Fundamentals of Information Systems Security © 2012 Jones and Bartlett Learning, LLC www.jblearning.com© 2012 Jones and Bartlett Learning, LLC www.jblearning.com Summary §Threats are controllable. §Risks are manageable. §Vulnerabilities are unavoidable. §All of these negatively affect the CIA triad. §Not all threats are intentional.