Cyber Security: Presented By: Raymunda Recto Moreno (Negros Occidental) Presented To: Dr. Ammon Denis R. Tirol
Cyber Security: Presented By: Raymunda Recto Moreno (Negros Occidental) Presented To: Dr. Ammon Denis R. Tirol
Presented by:
Presented to:
INFORMATION
Integrity Availability
The Dilemma of Security
• The problem that we cannot get away from in computer
security is that we can only have good security if everyone
understands what security means, and agrees with the need
for security.
• Security is a social problem, because it has no meaning
until a person defines what it means to them.
• The harsh reality is the following: In practice, most users
have little or no understanding of security. This is our
biggest security hole.
Meaning of Security Lies in Trust
• Every security problem has this question it needs to answer
first: Whom or what do we trust?
• On our daily lives, we placed some sort of technology
between us and the “things” we don’t trust. For example lock
the car, set the house alarm, give Credit Card number only to
the cashier, etc.
• So we decided to trust somebody/something to have some
sort of security (trust the lock, trust the police, trust the
cashier).
• We have to have the same scenario for computer & network
systems we use today.
Components of an
Information System
• People are the biggest threat to information security!!!
(WHY? – Because WE are the weakest link)
•Social Engineering . It is a system that manipulates the
actions of people in order to obtain information about a
system in order to obtain access.
• Procedures are written blueprints for accomplishing a
specific task; step-by-step descriptions.
The obtainment of the procedures by an unauthorized user
would constitute a threat to the integrity of the information.
Figure 5
Hardware
Software
People
Procedures
Data
Components of an Information System
Figure 6 Internet
Remote System
Hacker
Access vs. Security
Security Access
Cryptographic Accelerators
Authentication Tokens
Biometric/Recognition Methods
Examples
Type Cryptographic Authentication Biometric/
Accelerator Token Recognition
Definition Coprocessor External device External
that calculates that interfaces device that
and handles the with device to measures
Random grant access. 2 human body
Number types: contact factors to
Generation and allow access
NonContact
Examples PCI coprocessor Credit Card, Fingerprint,
RSA SecurID Optical,
Voice and
Signature
recognition
Biometrics Devices
Cell
Body
Continent Home
Region Car
Building
Campus
World
Fractal Cyberspace: a network
of … networks of … platforms
Robert Statica – Cybersecurity Original by Gordon Bell
Survival…..