Security breach

hi,

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

I have assignment that need to be turn in APA format. This project related is Security Breach.

Attached is the Project document that must be completed.  

You MUST use these Scenario  This Project assignment must include

 security breach .

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

with examples

security strategy

Prevention Methods

and incident responses in your solution to this assignment.

And Paper should be written in 13 pages.

And I also need PPT for this project in 10 slides.

Access Control, Authentication, and Public Key Infrastructure

Lesson 5

Security Breaches and the Law

© 20

1

5 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Page ‹#›

Access Control, Authentication, and PKI

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com
All rights reserved.
1

Laws and Data Breaches

Federal and state laws act as deterrents

Organizations are required to take steps to protect the sensitive data

An organization may have a legal obligation to inform all stakeholders

if a breach occurred

Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.

2

Federal Laws
Computer Fraud and Abuse Act (CFAA) designed to protect electronic data from theft
Digital Millennium Copyright Act (DMCA) prohibits unauthorized disclosure of data by circumventing an established technological measure

Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
The Computer Fraud and Abuse Act (CFAA)[1] was enacted by Congress in 1986 as an amendment to existing computer fraud law (18 U.S.C. § 1030), which had been included in the Comprehensive Crime Control Act of 1984.
2008[1]
Eliminated the requirement that information must have been stolen through an interstate or foreign communication, thereby expanding jurisdiction for cases involving theft of information from computers;
Eliminated the requirement that the defendant’s action must result in a loss exceeding $5,000 and created a felony offense where the damage affects ten or more computers, closing a gap in the law;
Expanded 18 U.S.C. § 1030(a)(7) to criminalize not only explicit threats to cause damage to a computer, but also threats to (1) steal data on a victim’s computer, (2) publicly disclose stolen data, or (3) not repair damage the offender already caused to the computer;
Created a criminal offense for conspiring to commit a computer hacking offense under section 1030;
Broadened the definition of “protected computer” in 18 U.S.C. § 1030(e)(2) to the full extent of Congress’s commerce power by including those computers used in or affecting interstate or foreign commerce or communication; and
Provided a mechanism for civil and criminal forfeiture of property used in or derived from section 1030 violations.
3

State Laws
California Identity Theft Statute requires businesses to notify customers when personal information has been disclosed
Research specific laws that apply in your state.
You can begin by visiting your state’s
Office of Attorney General Web site.

Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Kentucky State Laws
On April 10, Governor Beshear signed into law H.B. 232, designed to address the compromise of personally identifiable information of residents of the Bluegrass State. The law also requires cloud service providers that contract with educational institutions (K-12) to maintain the security of student data (name, address, email address, emails, and any documents, photos or unique identifiers relating to the student) and prohibits the sale or disclosure, or processing of student data for commercial purposes.
Like most states, Kentucky has defined personally identifiable information as first name or first initial and last name combined with any of the following data elements when the name or data element is not redacted:
Social Security number
Driver’s license number
Account number, credit or debit card number in combination with any required security code, access code or password permitting access to an individual’s financial account

Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
First-Layer Access Controls
All physical security must comply with all applicable regulations
Access to secure computing facilities granted only to individuals with a legitimate business need for access.
All secure computing facilities that allow visitors must have an access log.
Visitors must be escorted at all times

Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Most common and easiest form of access
To be effective: Requires the use of a secure channel through the network to transmit the encrypted password
Not very secure
WHY USE THEM??
Something you know
User friendly – People get the concept (like an ATM pin #)
Two factor authentication
– Combine passwords with a (smart card) token
– ATM card and PIN –improved protection
Easy to manage
Supported across IT platforms
6

Access Control Failures
People
Technology

Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
People
Social engineering
Phishing and spear phishing attacks
Poor physical security on systems
File-sharing and social networking sites

Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.

8

Technology
Very weak password encryption
Web browsers are a major vector for unauthorized access
Web servers and other public-facing systems, are an entry point for unauthorized access

Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.

9

Privacy Impact Assessment (PIA)
A comprehensive process for determining the privacy, confidentiality, and security risks associated with the collection, use, and disclosure of personal information
Describes the measures used to mitigate and, if possible, eliminate identified risks
Required in the public sector for any new system that handles personally identifiable information (PII)

Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.

10

Privacy Impact Assessment (PIA) (Cont.)
Identifies the key factors involved in securing PII
Emphasizes the process used to secure PII as well as product
Has a sufficient degree of independence from the project implementing the new system
Has a degree of public exposure
Is integrated into the decision-making process

Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.

11

Security Breach Principles

Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
The difference between a direct & an indirect attack is in a
direct attack, the computer being used is that of the criminal to commit a break-in of other computers/systems whereas an
indirect attack is where the actual computer or system being attacked is compromised to completely this objective.
12

System exploits

Eavesdropping

Social engineering

Denial of service (DoS) attacks

Indirect attacks

Direct attacks

Consequences
Security breaches can have serious consequences for an organization.
They can rely on:
Lax physical security
Inadequate logical access controls
A combination of both

Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.

13

Implications of Security Breaches

Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.

14

Damages organizations’ computer systems

Financial Impact

Legal action

Loss of reputation

Costs of contacting all of the individuals

Organization’s market share

Prevent or Mitigate Access Control Attacks

Example: Target

‹#›

Hackers originally gained access to Target’s network by stealing the access credentials, via a phishing attack, of a refrigeration contractor

Electronic interaction with Target was limited to billing, contract submission, project management

Sophisticated and prolonged attack at Target

Once the hackers infiltrated the Target network, they distributed malware to thousands of PoS machines designed to siphon off customer data

The stolen data was later uploaded from the Target network to an FTP server

Then, they set up a control server within Target’s internal network that acted as the central repository for the stolen credit card data

Example Discussion Activity
How could this attack have been prevented?

‹#›

Protecting the Enterprise

‹#›

Requires a coordinated defense involving people, processes and tools that span anti-malware, firewalls, applications, servers, network access controls, intrusion detection and prevention, security event monitoring, and more

Identity and Access Management (IAM)
Obtain visibility and control over user access privileges, who has access to what?

‹#›

Detective controls

Access policy

Automated account reconciliation

Authentication Attacks

‹#›

Occur when a web application authenticates users unsafely, granting access to web clients that lack the appropriate credentials

Access Control Attacks

‹#›

Occur when an access control check in the web application is incorrect or missing, allowing users unauthorized access to privileged resources such as databases and files

Web Applications

‹#›

Exposing these rich interfaces to anyone on the Internet makes web applications an appealing target for attackers who want to gain access to other users’ data or resources

Access Control

‹#›

Access control attacks attempt to bypass or circumvent access control methods

Access control begins with identification and authorization

Access Aggregation

‹#›

Collecting multiple pieces of non-sensitive information and combining, or aggregating, the pieces to learn sensitive information

Reconnaissance Attacks

‹#›

Access aggregation attacks that combine multiple tools to identify elements of a system, such as IP addresses, open ports, running services, and operating systems

Protecting Against Access Control Attacks

‹#›

Control physical access to systems

Control electronic access to password files

Encrypt password files

Create a strong password policy

Use password masking

Deploy multifactor authentication

Use account lockout controls

Use last logon notification

Educate users about security

Audit access controls

Actively manage accounts

Use vulnerability scanners

Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Virtual Lab
Managing Group Policy Objects in Active Directory

Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
If your educational institution included the Jones & Bartlett labs as part of the course curriculum, use this script to introduce the lab:
 
“In this lesson, you learned about ways that compromised access controls can result in security breaches. You also discovered the legal implications of security incidents. One effective way to help prevent security breaches is to enforce system logon security controls.
 
In the lab for this lesson, you will use the Group Policy Management tool to edit the default domain policy and set up a new password policy. You will also create a new group policy object (GPO) and apply it to an organizational unit.”
6/7/2016
28

Still stressed from student homework?
Get quality assistance from academic writers!

Order your essay today and save 25% with the discount code LAVENDER