INFORMATION ASSURANCE
Threats, Attacks & Controls
Rebecca Patient
Cyber Security
KEY THREATS – HUMAN FACTORS
• THE GET OUT CLAUSE: “NOT MY FAULT”.
12/11/2014CMPRPATI
2
• ISSUES OCCUR AROUND: 80-90% INTERNALLY
& ONLY 20% EXTERNALLY.
LIKELIHOOD OF ATTACKS
IT Students – cracking passwords using Hash Kracker
to gain access to lecturer's partition on the drive:
•Risk Calculation: Risk = Threat x Likelihood x Cost.
•Less than 1% chance of an attack occurring.
Other breaches:
•Inability to hide grades permitting confidential
information to be misused.
12/11/2014CMPRPATI
3
MAIN CONTROL'S:  
 Misuse of Privileges – Sanction.
 Protocol Penetration – Consent Form.
 Check firewalls & anti-virus software.
 Non-Authorisation – Passwords with authentication,
smart cards and biometrics.
 Create a vulnerability list - maintain procedures.
 Hacker Profiling.
12/11/2014CMPRPATI
4
• Risk Assessment / Auditing processes !!
PAUSE FOR THOUGHT - FUTURE ISSUES?
12/11/2014CMPRPATI
5
• A Possible 9/11 of the University Cyber World?
• No, an attack would be unseen until those person(s)
would want you to know.
• Or is it reality?
Blackboard brought to a stand still.
SECURITY IS ONGOING PROCESS !
12/11/2014CMPRPATI
6
For More Information – check out these Links:
HTTPS://WWW.CYBERSTREETWISE.COM
HTTP://WWW.BBC.CO.UK/PROGRAMMES/B04P23
MV : CYBER CRIMES WITH BEN HAMMERSLEY
Next: Risk Assessment to be produced.
12/11/2014CMPRPATI
7
THANKS FOR LISTENING
ANY QUESTIONS?

Information Assurance Presentation

  • 1.
    INFORMATION ASSURANCE Threats, Attacks& Controls Rebecca Patient Cyber Security
  • 2.
    KEY THREATS –HUMAN FACTORS • THE GET OUT CLAUSE: “NOT MY FAULT”. 12/11/2014CMPRPATI 2 • ISSUES OCCUR AROUND: 80-90% INTERNALLY & ONLY 20% EXTERNALLY.
  • 3.
    LIKELIHOOD OF ATTACKS ITStudents – cracking passwords using Hash Kracker to gain access to lecturer's partition on the drive: •Risk Calculation: Risk = Threat x Likelihood x Cost. •Less than 1% chance of an attack occurring. Other breaches: •Inability to hide grades permitting confidential information to be misused. 12/11/2014CMPRPATI 3
  • 4.
    MAIN CONTROL'S:   Misuse of Privileges – Sanction.  Protocol Penetration – Consent Form.  Check firewalls & anti-virus software.  Non-Authorisation – Passwords with authentication, smart cards and biometrics.  Create a vulnerability list - maintain procedures.  Hacker Profiling. 12/11/2014CMPRPATI 4 • Risk Assessment / Auditing processes !!
  • 5.
    PAUSE FOR THOUGHT- FUTURE ISSUES? 12/11/2014CMPRPATI 5 • A Possible 9/11 of the University Cyber World? • No, an attack would be unseen until those person(s) would want you to know. • Or is it reality? Blackboard brought to a stand still. SECURITY IS ONGOING PROCESS !
  • 6.
    12/11/2014CMPRPATI 6 For More Information– check out these Links: HTTPS://WWW.CYBERSTREETWISE.COM HTTP://WWW.BBC.CO.UK/PROGRAMMES/B04P23 MV : CYBER CRIMES WITH BEN HAMMERSLEY Next: Risk Assessment to be produced.
  • 7.