Está en la página 1de 44

Introducción al Concepto de IT

Security
Alonso Sal y Rosas
Security Systems Engineer, Service Provider
April 2020
OVERVIEW
 Brainstorming
 Definition Security
 Security Features
 Concept of Cyberspace
 Concept of Cybercrime
 Concept of Cybersecurity
 The way forward

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
Brainstorming

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Brainstormin
g
What is Security?
Security according to two boys of 10 years old

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Brainstormin
g
What is Security?
Security According to Junior High School ICT teacher

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Brainstorming
What is Security?

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Definition Security

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Definition Security

No hay una definición clara

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Definition Security

La seguridad es un proceso, no un
estado final.

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Definition Security

La seguridad es el proceso de mantener un nivel aceptable de riesgo


percibido.

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Definition Security

Ninguna organización puede considerarse "segura" por ningún tiempo más allá de la última verificación
de cumplimiento de su política de seguridad.

Si su gerente le pregunta: "¿Estamos seguros?"


deberías responder: "Déjame comprobar".
Si él o ella pregunta: "¿Estaremos seguros mañana?“
Debe responder: "No sé".

Tal honestidad no será popular, pero esta mentalidad producirá un mayor éxito para la organización a
largo plazo.

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Security Features

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Security has three features

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Security Features

Confidencialidad
La confidencialidad es más o menos equivalente a la privacidad. Medidas
emprendidas para garantizar que la confidencialidad esté diseñada para
evitar que la información confidencial llegue a las personas equivocadas, al
tiempo que se asegura de que las personas adecuadas puedan obtenerla:

Confidencialidad
Garantía de que la información se comparte solo entre personas autorizadas
u organizaciones.

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Security Features

Integridad.
Aseguramiento de que la información es auténtica y completa.
Integridad
En seguridad de la información, la integridad de los datos significa mantener y
asegurar la precisión y consistencia de los datos durante todo su ciclo de vida.

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Security Features

Disponibilidad
Asegurarse de que los sistemas responsables de entregar, almacenar y
procesar la información sean accesibles cuando sea necesario, por quienes
los necesiten.

Disponibilidad
La disponibilidad de información se refiere a garantizar que las partes
autorizadas puedan acceder a la información cuando sea necesario

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Concept of Cyberspace

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Concept of Cyberspace
Cyberspace

Cyberspace is "the environment in which communication


over computer networks occurs.“

And almost everybody


in one way or the other
is connected to it

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Concept of Cyberspace

Ladies in the market


are connected to is to
run their businesses

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Concept of Cyberspace

Shepherds are connected


to locate their cattle

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Concept of Cyberspace

Hunters are connected to


it to locate their prey

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Concept of Cyberspace

Our friend, the farmer is


connected to it and
“Facebooking” in the coconut
tree

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Concept of Cyberspace

Our friends in the remote


areas are also connected to it

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
Concept of Cyberspace

Huum! isn’t amazing?


They are also
connected.

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Concept of Cyberspace

On a more serious note, are connected

Law makers

Government Judiciary

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Concept of Cyberspace

Militaries

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Concept of Cyberspace

Health Sectors

Banks Transportation Sectors

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Concept of Cyberspace

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Concept of Cybercrime

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Concept of Cybercrime

Cyber Crime

El delito informático, o cibercrimen, es cualquier delito que involucra una computadora y


una red.
La computadora puede haber sido utilizada en la comisión de un delito, o puede ser el
objetivo.

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
Concept of Cybercrime

Tsutomu Shimomura
Kevin Mitnick

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
Concept of Cybercrime

Commonwealth Bank, Australia - Marzo de


2011: - Los cajeros automáticos (ATM)
expulsaron decenas de miles de dólares gratis
en Sydney el martes después de que una falla
en la computadora se convirtiera en una
pesadilla para el Commonwealth Bank.
Seguridad de TI Cree que es la consecuencia
de la piratería.

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
Concept of Cybercrime

Underground Economy

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Concept of Cybercrime

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
Concept of Cybercrime

Phishing

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
Concept of Cybercrime

Hacktivism

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
Concept of Cybercrime

Cyberwar: Estonia Case

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
Concept of Cybercrime

Stuxnet

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
Concept of Cybersecurity

The threat is real

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
Concept of Cybersecurity

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
Concept of Cybersecurity
Tentative Definitions

La seguridad cibernética, también conocida como seguridad de la tecnología de la


información, se centra en proteger las computadoras, redes, programas y datos del
acceso, cambio o destrucción no intencionados o no autorizados.

University of Maryland University College

El estado de estar protegido contra el uso criminal o no autorizado de datos


electrónicos, o las medidas tomadas para lograrlo.
"Algunas personas han argumentado que la amenaza a la ciberseguridad se ha
inflado un tanto“
Oxford Dictionary

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
The way forward

 Las TIC son un punto único de falla para las empresas.


 IS Security es el talón de Aquiles de las TIC
 Tu seguridad depende de la mía y la mía depende de la tuya,
 Unámonos y protejamos nuestro ciberespacio es crear y gestionar un CSIRT
HOW?
CSIRT

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43

También podría gustarte