Time
10 hours 28 minutes
Difficulty
Advanced
CEU/CPE
15

Video Description

This lesson focuses on risk implications and mentions the CIA Triad:

  • Confidentiality
  • Integrity
  • Availability

The lesson also discusses risk exposure and the factors which expose business to risk: - Mergers, acquisitions and partnerships

  • Technology
  • Employees: 80% of fraud in business comes from within

It is important to remember there are new threats and new technology always coming out and be very aggressive to stay current to keep a business the most secure.

Video Transcription

00:04
as we move forward and continue to talk about risk, One of the first things that we'll talk about is the idea behind risk implications. Now we've already mentioned the C I A Triad, but as security professionals, when we think about risk, we frame it into the context of confidentiality, integrity
00:22
and availability. And we've already referenced a couple of ideas here,
00:25
um,
00:27
about how risks, you know, what are the potentials? The potential for law surrounding confidentiality against social engineering? I'm only going to say that about 10,000 more times this video, but that's really where the threats are coming from today.
00:42
Media reuse Eavesdropping on the network Uh, you know, those air certainly ideas as well, but social engineering is the big one integrity, any sort of modification of data and that comes from intentional or unintentional access. Corruption across lines, malicious activity
01:00
or accidental delicious files, for instance, or modification from users
01:04
and then availability. Anything that takes a system offline, natural disasters, denial of service attacks, whatever those may be.
01:14
So where do we get these exposures to risks? Where do we open ourselves up for the potential for loss? Well, there's a potential for loss everywhere. You know, it comes from all sorts of different directions. Honestly, just day to day business opens us up for the potential for loss.
01:30
But certainly the business environment is frequently changing.
01:34
Mergers, acquisitions and partnerships. You know, our environment is under our control. We can assume we've done good risk management. We've written the policies in place where monitoring risks were ongoing with day to day and then all of a sudden, everything we've done changes. We've partnered with another organization
01:53
or we required another organization. We've merged organization. So now this environment that we know
02:00
that we've planned for that we've addressed all of a sudden is very fluid. And it's changing because of bringing in an unknown entity. Perhaps, or certainly that's an area from which risk comes
02:10
technology, and you can't say enough about the potential for loss that technology brings into your environment. Off course technology is a wonderful benefit. If you look at the efficiency that we get from our employees today versus 20 years ago,
02:28
the technology has made incredible advances, but also there's always that trade off and with technology, and I don't care what that technology is, their new risks associate it. You know when when you take the idea. I think I've already mentioned we talked about networking
02:44
NETWORKINGS about sharing information, and it makes it so much easier
02:49
for us on a network to share files toe access data to make information publicly available. But the whole purpose of networking is to share, and that is in direct contrast with what we're looking for from a security perspective. So network security. Those two have counter purposes
03:07
when you bring in, you know, when you look at any of the technology surrender, whether it's hardware software near the risks associate with the new operating system, we know that every time an operating system is released, they're usually several service packs before it really runs, as it should in a secure fashion.
03:25
We know that as soon as you put something out to market, Attackers are already chipping away, looking to find a compromise. And that's not from one vendor or another. That's across all vendors, especially as other vendors gain way in the marketplace. You know, it used to just be Windows on desk cops. You should just be Cisco's on Cisco on your routers,
03:46
you know, is we're seeing other organizations.
03:49
Uh uh, infiltrate the business market. They bring this with them associative risks as well. Software. That's That's the key area where we see the threats come into play. Um, software is not written to be secure
04:06
Software's written to work and to provide function.
04:09
And then oh, yeah, maybe we should secure it comes as an afterthought.
04:14
Um, you know, And if you think about it, for any of you that maybe have taken a programming class at some point in time during college or high school or whenever that may have been. If you think back to that programming class, how much of that class was devoted to writing secure code?
04:31
And I can probably answer that question for you. My guess would be none of the class was devoted to writing secure code. So it's no wonder we have operating systems with security vulnerability and applications that have exploits. Of course we do. We're not asking our developers to write secure code.
04:47
We're giving them a very tight time deadline and saying makes him code work by the state,
04:53
and we'll figure it out how to secure it later. So what do we do, we bring in routers would bring an intrusion detection systems, firewalls and all these elements to provide security around the software.
05:04
But if instead, our technology was designed to be secure from the start, how much better off we'll be?
05:11
And that's true of everything. I mean, think about the protocols we use.
05:15
You're familiar? TCP I peed the protocol of the Internet.
05:18
Well, if we focus in on I p If I were to say what type off built in security mechanism secures I p traffic,
05:27
the answer is not.
05:29
There's nothing built in tow i p to secure it. Certainly not I p version for
05:33
And that's the protocol off the Internet. Internet protocol.
05:38
How in the world do we have a protocol to be used across the Internet
05:43
that doesn't have any security built in?
05:46
The answer is very simple wasn't designed to be the protocol of the Internet as we know it today.
05:50
I P was designed to provide transport of information across a physically secured government link. It was designed for the government back in the sixties. Well, if you have a strict control upon your links for communication, you know the thought is. Well, I don't have to worry about protocol security.
06:09
But like so many things Protocol Service's applications,
06:13
they've gone beyond their original purpose. So now we have the I. P Protocol floating out across the Internet that's inherently and natively unsecure,
06:23
which is why we're moving toe i p version six, which is a secured protocol. And that's a very important reason that we're goingto i p b six. So many people here we're running out of I p addresses. The sky's falling we're out of I p addresses. That's not really the case because we have so many mechanisms in place
06:41
to mitigate the fact that, yeah, we've got a limited number of I P addresses.
06:45
The real push to move to I p Version six needs to be because I p v six was designed with I p sec integrated I p sec I p Security was designed as part of the I P V six protocol to provide security.
07:02
So finally, rather than having a protocol that will secure later,
07:06
we have a secure protocol from the start. Now, again, I'm not saying anything is perfect and can't be bypassed any of that. But what I'm saying is if you start with a secure product, you're much better off than starting with an unsecure product. And it's that basic. Okay, technology brings in vulnerabilities. And
07:26
again, the biggest reason it brings in vulnerabilities is because it was designed with function in mind,
07:30
not security.
07:32
I teach a lot of project management classes, and we talk about establishing baselines for our products. And one of the things that we have to see changed with technology technology
07:43
is the functional baseline must include security.
07:47
What that means is, we stop saying, does it work
07:51
and then is it secure?
07:55
But the question becomes, Does it work securely or it doesn't work at all. And that's where we have to shift our focus. Otherwise, we're not gonna We're gonna be in the same boat as we continue.
08:07
All right. Risks also come from our employees, and you know that
08:11
and, uh, employees again, it doesn't have to be a malicious action by the employees to introduce vulnerabilities and threats to our threats to our networks. A well intentioned user can just Aziza Lee delete an essential file is anyone militias, and it causes the same amount of damage
08:31
so We have to make sure that when we're looking at our security solutions,
08:35
we address employees on the inside. You can't always just rely on technical solutions. You know, we talked, uh, certainly will continue to talk about layer defense, and we look for physical, administrative and technical controls that we put in place. Certainly, this class focuses more on technical controls,
08:54
but things like separation of Judy's
08:58
making sure No. One employee has too much power for access on the network.
09:03
You know, the person that prints out my paychecks should never be the person to sign my paychecks. That gives them too much power. So you separate. Judy's out, and you have two distinct job functions for two different roles in the organization. So, you know we need good, strong hiring policies. We need reference checks and background checks.
09:22
We need to check all of those pieces of information before we ever bring somebody on to our organization.
09:28
We need audit policies to make sure our employees aren't abusing privileges. Um, we need to have termination procedures in place, you know, when someone's terminated, their credentials should be revoked immediately. There should be a job, An exit interview they should be escorted from the building at all possible.
09:46
The idea is, we've got to think about our employees.
09:50
80% of fraud
09:52
comes from in house, not outside. When we start thinking of technical solutions like firewalls and encryption, all those pieces if the people on the inside, the ones that are touching the data, if they're the ones committing fraud, there's firewalls don't help us very much. So we have to think in house as well as external to our organization.
10:11
But risk comes from all directions. Risk comes from everywhere.
10:18
A new products and technologies. Yeah, you know, we we've really kind of talked about these ideas. New products again is as updates come out as we go from this version. Version seven diversion aid of whatever software that's out there
10:35
again. Any time there's something unproven,
10:41
untested, it presents a threat. You know, our. It certainly has the potential to bring more risk onto into the environment. So new products and new technologies, although they make out very strong benefits, we always have to put those through a testing or vetting process and make sure
11:00
that they're gonna provide
11:01
the security that's necessary in our organization.
11:05
New threats, new threats are coming up all the time.
11:09
If your mission is to be aware of what's going on today and to protect your network from what's out there today, you're already stepped behind
11:18
because by the time you implement a solution for today's attack, tomorrow's attack is already there. So we have to be very proactive. We have to be very aggressive, you know, As an I T. Security individual, we have to stay on the forefront. We've got to be reading the security magazines and articles.
11:37
We've got to do everything that we can to stay current.
11:39
This is the type of field that if you're out for a week, everything's changed when you come back. So these new threats, the potential for harm. You know, if I'm dealing with yesterday's problems, I'm a day behind, so staying very aggressive, very up to date, making sure that our technology that we put in place is very flexible
11:58
and that can be modified is necessary.
12:01
And again
12:01
worry. Talk about users

Up Next

CompTIA CASP

In our online CompTIA CASP training, you will learn how to integrate advanced authentication, how to manage risk in the enterprise, how to conduct vulnerability assessments and how to analyze network security concepts and components.

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor