SlideShare a Scribd company logo
Morten Bo Nielsen – mon@eal.dk 1/12
ITT2 IT security introduction
2014S
Morten Bo Nielsen – mon@eal.dk 2/12
Today
1.Quick introduction
• Course and security in general
2.Risk
• The NIST way
3.Exercise time
Morten Bo Nielsen – mon@eal.dk 3/12
Course plan
It will be on fronter soon
(soory about the delay)
Morten Bo Nielsen – mon@eal.dk 4/12
Course
What is security?
Technical vs. non-technical
Risk (both known and unknown)
Morten Bo Nielsen – mon@eal.dk 5/12
Formal stuff
NIST 800-30
ISO 27000 family
Morten Bo Nielsen – mon@eal.dk 6/12
Informal stuff
Sans 20 critical security controls
Blogs, magazines, opinions, articles, FUD and so
on
Morten Bo Nielsen – mon@eal.dk 7/12
NIST 800-30
2.3.1 Risk Models (p. 8)
Figure 5: RISK ASSESSMENT PROCESS (p. 23)
TABLE D-2:TAXONOMY OFTHREAT SOURCES (p. D-2)
TABLE F-4:TAXONOMY OF PREDISPOSING CONDITIONS (p. F-4)
Morten Bo Nielsen – mon@eal.dk 8/12
Know this
Threat +Vulnerability = Attack
Likelihood x Impact = Risk
Impact: Confidentiality, Integrity,Availability
Morten Bo Nielsen – mon@eal.dk 9/12
Risk
RISK
Morten Bo Nielsen – mon@eal.dk 10/12
Assignment context
● 30 employees
● Architechs
● State any other assumptions
Morten Bo Nielsen – mon@eal.dk 11/12
Assignment
● Consider threats, vulnerabilities, likelihood and
impact
● File server backup failed
● CEO login credentials stolen
● User writes bad password three times and is locked out
● Internet connection fails
● Homepage is defaced
Morten Bo Nielsen – mon@eal.dk 12/12
Credits & licences
● Content by Morten Bo Nielsen
License: Creative Commons Attribution-NonCommercial-ShareAlike 3.0
Unported License. (http://creativecommons.org/licenses/by-nc-sa/3.0/)
● EAL logo might be an issue, please check before you use it

More Related Content

PDF
Itt2 its introduction
PPTX
Value
PPTX
Ultranet levers
PPT
0762219 Bluffed and Stacked
PPTX
Big centre tv
PPT
1950s
PPT
PPTX
Social mood theory 2017
Itt2 its introduction
Value
Ultranet levers
0762219 Bluffed and Stacked
Big centre tv
1950s
Social mood theory 2017

Similar to Itt2 its introduction (20)

PDF
Microsoft InfoSec for cloud and mobile
PDF
Information Security Management 101
PPTX
ISMS User_Awareness Training.pptx
PDF
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
PPT
ch01.ppt
PPT
educational content, educational contented educational content
PPT
information security presentation topics
PPT
CISSP Certified Information System Security Professional_009.ppt
PPT
INFORMATION SECURITY STUDY GUIDE for STUDENTS
PPTX
Final Presentation
PPTX
PDF
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
PPTX
2021 BSides Tampa Cyber Security Careers
PDF
Sem 001 sem-001
PDF
CRISC Certification Course Content.pdf
PDF
Cyber Risk Management in 2017: Challenges & Recommendations
PPTX
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
PDF
UNYCC Information Security Discussion
PDF
Primer for Information Security Programs
PPTX
INFRAGARD 2014: Back to basics security
Microsoft InfoSec for cloud and mobile
Information Security Management 101
ISMS User_Awareness Training.pptx
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
ch01.ppt
educational content, educational contented educational content
information security presentation topics
CISSP Certified Information System Security Professional_009.ppt
INFORMATION SECURITY STUDY GUIDE for STUDENTS
Final Presentation
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
2021 BSides Tampa Cyber Security Careers
Sem 001 sem-001
CRISC Certification Course Content.pdf
Cyber Risk Management in 2017: Challenges & Recommendations
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
UNYCC Information Security Discussion
Primer for Information Security Programs
INFRAGARD 2014: Back to basics security
Ad

More from Morten Nielsen (20)

PDF
Itt1 intro project management
PDF
Itt1 intro knowing and doing
PDF
Itt2 its pki and certificates
PDF
Itt2 its ssl and services
ODP
Itt2 its ids
ODP
Itt2 its encrypted storage
ODP
Itt3 virtual machines
ODP
Itt1 sd requirements
ODP
Itt1 sd uml and oo
ODP
Itt3 its acl
ODP
Itt3 its social engineering
ODP
Itet3 its forensics
ODP
Diagram cookbook
ODP
ITET3 Networking P2P
ODP
ITET1 Routing Transport layer.odp
ODP
ITET1 Routing Application layer.odp
ODP
ITET3 ITS governance
ODP
Routing vlans
ODP
Itet2 its social engineering
ODP
Itet2 its counter recon
Itt1 intro project management
Itt1 intro knowing and doing
Itt2 its pki and certificates
Itt2 its ssl and services
Itt2 its ids
Itt2 its encrypted storage
Itt3 virtual machines
Itt1 sd requirements
Itt1 sd uml and oo
Itt3 its acl
Itt3 its social engineering
Itet3 its forensics
Diagram cookbook
ITET3 Networking P2P
ITET1 Routing Transport layer.odp
ITET1 Routing Application layer.odp
ITET3 ITS governance
Routing vlans
Itet2 its social engineering
Itet2 its counter recon
Ad

Recently uploaded (20)

PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PPTX
Cell Types and Its function , kingdom of life
PDF
Computing-Curriculum for Schools in Ghana
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
Institutional Correction lecture only . . .
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
GDM (1) (1).pptx small presentation for students
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
Cell Types and Its function , kingdom of life
Computing-Curriculum for Schools in Ghana
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Final Presentation General Medicine 03-08-2024.pptx
VCE English Exam - Section C Student Revision Booklet
Abdominal Access Techniques with Prof. Dr. R K Mishra
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
STATICS OF THE RIGID BODIES Hibbelers.pdf
Institutional Correction lecture only . . .
O7-L3 Supply Chain Operations - ICLT Program
Final Presentation General Medicine 03-08-2024.pptx
GDM (1) (1).pptx small presentation for students
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Supply Chain Operations Speaking Notes -ICLT Program
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
2.FourierTransform-ShortQuestionswithAnswers.pdf
3rd Neelam Sanjeevareddy Memorial Lecture.pdf

Itt2 its introduction

  • 1. Morten Bo Nielsen – mon@eal.dk 1/12 ITT2 IT security introduction 2014S
  • 2. Morten Bo Nielsen – mon@eal.dk 2/12 Today 1.Quick introduction • Course and security in general 2.Risk • The NIST way 3.Exercise time
  • 3. Morten Bo Nielsen – mon@eal.dk 3/12 Course plan It will be on fronter soon (soory about the delay)
  • 4. Morten Bo Nielsen – mon@eal.dk 4/12 Course What is security? Technical vs. non-technical Risk (both known and unknown)
  • 5. Morten Bo Nielsen – mon@eal.dk 5/12 Formal stuff NIST 800-30 ISO 27000 family
  • 6. Morten Bo Nielsen – mon@eal.dk 6/12 Informal stuff Sans 20 critical security controls Blogs, magazines, opinions, articles, FUD and so on
  • 7. Morten Bo Nielsen – mon@eal.dk 7/12 NIST 800-30 2.3.1 Risk Models (p. 8) Figure 5: RISK ASSESSMENT PROCESS (p. 23) TABLE D-2:TAXONOMY OFTHREAT SOURCES (p. D-2) TABLE F-4:TAXONOMY OF PREDISPOSING CONDITIONS (p. F-4)
  • 8. Morten Bo Nielsen – mon@eal.dk 8/12 Know this Threat +Vulnerability = Attack Likelihood x Impact = Risk Impact: Confidentiality, Integrity,Availability
  • 9. Morten Bo Nielsen – mon@eal.dk 9/12 Risk RISK
  • 10. Morten Bo Nielsen – mon@eal.dk 10/12 Assignment context ● 30 employees ● Architechs ● State any other assumptions
  • 11. Morten Bo Nielsen – mon@eal.dk 11/12 Assignment ● Consider threats, vulnerabilities, likelihood and impact ● File server backup failed ● CEO login credentials stolen ● User writes bad password three times and is locked out ● Internet connection fails ● Homepage is defaced
  • 12. Morten Bo Nielsen – mon@eal.dk 12/12 Credits & licences ● Content by Morten Bo Nielsen License: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License. (http://creativecommons.org/licenses/by-nc-sa/3.0/) ● EAL logo might be an issue, please check before you use it