The CNSS Security Model
The CNSS Security Model
The CNSS Security Model
The CNSS security model. How would you address them in your
organization?
1
UNIT-1 Introduction to Information Security
from the cloud services provider. This Assignment will highlight how The Committee of
National Security System can help to reduce malicious insider threats in the organization.
Background
Year by year the importance of Information Security (InfoSec) and Information
Assurance (IA) grows. In 2018, security budgets received higher priority worldwide
compare with 2017. The spending on security is expected to grow from $101 billion in
2017 to $124 Billion in 2019, an increase of 12.4 percent from last year, according to the
latest forecast from Gartner, Inc. In 2019, the market is forecast to grow 8.7 percent to
$124 billion [1].
Worldwide Security Spending by Segment, 2017-2019 (Millions of U.S. Dollars) **
Application
Security 2,434 2,742 3,003
Cloud
Security 185 304 459
Identity
Access
Management 8,823 9,768 10,578
Infrastructure
Protection 12,583 14,106 15,337
Integrated
Risk
Management 3,949 4,347 4,712
Network
Security
Equipment 10,911 12,427 13,321
Other
Information
Security
Software 1,832 2,079 2,285
Security
Services 52,315 58,920 64,237
Consumer
Security
Software 5,948 6,395 6,661
2
UNIT-1 Introduction to Information Security
3
UNIT-1 Introduction to Information Security
Figu
re 1-1 Components of Information Security
C.I.A Triad/Triangle
The C.I.A triangle has been the industry standard for computer security since the
development of the mainframe. It’s based on the three characteristics of information that
give it value to the organization.
4
UNIT-1 Introduction to Information Security
Figure
1.2 C.I. A Triangle/Triad
Critical Characteristics of Information
It is based on three major characteristics of information in the beginning, and now it has
expanded into a more comprehensive list of critical characteristics of information.
Confidentiality: Another term for confidentiality would be privacy. Company policies
should restrict access to the information to authorized personnel and ensure that only
those authorized individuals view this data. The data may be compartmentalized
according to the security or sensitivity level of the information. Misuse.
For example, the machine operator should not have to access, the personal information
of all employees. Furthermore, employees should receive training to understand the best
practices in safeguarding sensitive information to protect themselves and the
organization from attacks.
The best method used here to ensure confidentiality is to include data encryption,
username ID and password, Two Factor Authentication, and minimizing exposure of
sensitive information.
Integrity: Integrity is the name of Accuracy, consistency, and trustworthiness of the data
during its entire life cycle. Here we make sure that data must be unaltered during the
transit and is not changed by unauthorized entities.
5
UNIT-1 Introduction to Information Security
For Example: If you forget your password, your password cannot be recovered from
hashed value. They must be reset.
If you downloaded a file, you could verify its integrity by verifying the hash values from
the source with the one you generated using any hash calculator. By comparing the hash
values, you can ensure that the file has not been tampered with or corrupted during the
transfer.
Availability: The Characteristic of information that enables user access to information in
a required format, without interference or obstruction. A user in this definition may be
either a person or another computer system.
For Example, This includes maintaining equipment, performing hardware repairs,
keeping operating systems and software up-to-dates, and creating backups ensure the
availability of the network and data to the authorized users. Plans should be in place to
recover quickly from natural or human-made disasters. Security equipment or software,
such as firewalls, guard against downtime because of attacks, such as the denial of
service (DoS). Denial of service occurs when an attacker attempts to overwhelm
resources, so the services are not available to the users.
Figu
re 1.3 ADS (Anti-DDoS Solution)
6
UNIT-1 Introduction to Information Security
What is commonly left out of such model is the need for guidelines and policies that
provide direction for the practices and implementations of technologies.
Components of an Information System
– Software – Hardware – Data
– People – Procedures – Networks
Software
The software components of Information System (IS) comprise applications, operating
systems, and assorted command utilities. Software programs are the vessels that carry
the lifeblood of information through an organization. These are often created under the
demanding constraints of project management, which limit time, cost, and workforce.
Hardware
Hardware is the physical technology that executes the software, store and carries the
data, and provides interfaces for the entry and removal of information from the system.
Physical security policies deal with hardware as a physical asset and with the protection
8
UNIT-1 Introduction to Information Security
of these physical assets from harm or theft. Applying the traditional tools of physical
security, such as locks and keys, restricts access to and interaction with the hardware
components of any information system. Securing the physical location of computers and
the computers themselves is important because a breach of physical security can result
in a loss of information. Unfortunately, most information systems are built on hardware
platforms that can’t guarantee any level of information security if unrestricted access to
the hardware if possible.
Data
Stored data, processed, and transmitted through a computer system must be protected
Data is often the most valuable asset possessed by an organization and is the main
target of intentional attacks.
The raw, unorganized, isolated potentially useful facts and figures that are later
processed and manipulated to produce information.
People
There are many roles for people in information systems. common ones include
System Analyst
Programmer
Technician
Engineer
Network manager
MIS (Manager of Information Systems)
Data Entry Operator
Procedure
A procedure is a series of documented actions taken to achieve something. A procedure
is more than a single simple task. A procedure can be quite complex and involved, such
as performing a backup, shutting down a system, patching software.
Networks
When Information Systems are connected to form Local Area Network (LANs), and these
LANs are connected to other networks such as the internet, new security challenges
rapidly emerge.
Steps to provide network security are essential, as is the implementation of the alarm and
intrusion system to make system owners aware of ongoing compromises.
Securing Components
Protecting the components from potential misuse and abuse by unauthorized users,
where the computer is used as an active tool to conduct the attack or computer itself is
the entity being attacked.
There are two types of attacks
Direct Attack: When a hacker uses his personal computer to break into as systems.
Indirect Attack: When a system is compromised and used to attack another system.
9
UNIT-1 Introduction to Information Security
A computer can, therefore, be both the subject and object of an attack, For Example, if
Remote system an attack on the system and then system compromised and then used
that system to an attack another system, at which point it becomes the more vulnerable
object of attack of an attack,
Balancing Information Security and Access
Information Security can’t be absolute: it is processed, not a goal
Must provide the security and is also feasible to access the information for its application
Should balance protection and availability.
Approaches to Information Implementation
Bottom-up-approach
Top-down approach
It has a higher probability of success.
The project is initiated by upper-level managers who issue policy & procedures and
processes.
Dictate the goals & expected outcomes of the project.
Determine who is suitable for each of the required actions.
SDLC Waterfall methodology
SDLC – is a methodology for the design and implementation of an information system
in an organization.
A methodology is a formal approach to solving a problem based on a structured
sequence of procedures.
SDLC consists of 6 phases.
10
UNIT-1 Introduction to Information Security
Investigation: It is the most important phase, and it begins with an examination of the event or
plan that initiates the process. During the phase, the objectives, constraints, and scope of the
project are specified. At the end of this phase, a feasibility analysis is performed, which
assesses the economic, technical and behavioral feasibilities of the process and ensures that
implementation is worth the organization’s time and effort.
Analysis: It begins with the information gained during the investigation phase. It consists of
the quality of the organization, the status of current systems, and the capability to support the
proposed systems. Analysts begin by determining what the new system is expected to do, and
how it will interact with existing systems.
Logical Design: In this phase, the information gained from the analysis phase is used to
begin creating a systems solution for the business problem. Based on business needs,
applications are selected that can provide needed services. Based on the applications needed,
data support and structures capable of providing the needed inputs are then chosen. In this
phase, analysts generate several alternative solutions, each with corresponding strengths and
weaknesses, and cost and benefits. At the end of this phase, another feasibility analysis is
performed.
Physical design: In this phase, specific technologies are selected to support the solutions
developed in the logical design. The selected components are evaluated based on a make or
buy decision. The final design integrates various components and technologies.
Implementation: In this phase, any needed software is created. Components are ordered,
received and tested Afterwards; users are trained and supporting documentation created.
Once all the components are tested individually, they are installed and tested as a system.
Again, a feasibility analysis is prepared, and the sponsors are then presented with the system
for a performance review and acceptance test.
Maintenance and change: It is the longest and most expensive phase of the process. It
consists of the tasks necessary to support and modify the system for the remainder of its
useful life cycle. Periodically, the system is tested for compliance, with business needs.
Upgrades, updates, and patches are managed. As the needs of the organization change, the
11
UNIT-1 Introduction to Information Security
systems that support the organization must also change. When a current system can no longer
support the organization, the project is terminated, and a new project is implemented.
Security Professionals and the organization
Senior Management Chief information office (CIO) is responsible for the assessment,
management, and implementation of information security in the organization.
Information Security Project Team
Champion: they promote the project to ensure its support, both financially and
administratively.
Team Leader: they understand project management, personnel management,
and informational security technical requirements.
Security policy developers: such individuals who understand the organizational
culture, existing policies and requirements for developing and implementing
successful policies.
Risk assessment specialists: these are those individuals who understand
financial risk assessment techniques, the value of organizational assets and the
security method to be used.
Security Professionals: they should be dedicated, trained, and well-educated
specialists in all aspects of information security from both a technical standpoint.
System Administrators: they are administrating the systems that house the
information used by the organization.
Data Owners: They are responsible for the security and use of a set of information.
They are also responsible to determine the level of data classification. They work with
subordinate managers to oversee the day-to-day administration of the data.
Data Custodians: they are responsible for the storage, maintenance, and protection of
the information. They have to oversee data storage and backups, implementing the
specific procedures and policies.
Data Users: they work with the information to perform their daily jobs supporting the
mission of the organization. Everyone in the organization is responsible for the security of
data, so data users are included here as individuals with an information security role.
12
UNIT-1 Introduction to Information Security
1. Confidentiality-Policy and Storage: in this process, the University has certain policies
and guidelines for an enrolled student and staff. All the relevant data associated is kept
confidential only accessible to authorized personnel only, and a secure storage solution
is provided by the University to safeguard its and student’s data.
2. Confidentiality-Policy and Processing: in this process, an authorized person is appointed
to process data whenever required. That person must maintain the confidentiality of data
and work according to university policies. The example here I can put is, I am submitting
this assignment electronically to my lecturer only.
3. Confidentiality-Policy and Transmission: in this process only keeping data confidential
and personal working under policies is not enough as a secure medium is required for
transmission of that data when a user requests to access. The university is required to
use all necessary measures to secure a transmission.
4. Confidentiality-Education and Storage: only a student enrolled subject should get the
subject materials of the enrolled subject. That is the use of educational data and storage
of material should be kept confidential for the actual students not all.
5. Confidentiality-Education and Processing: the lecturer needs to update slides or
educational materials constantly updates any new materials and sent to the subject
enrolled students.
13
UNIT-1 Introduction to Information Security
14
UNIT-1 Introduction to Information Security
21. Availability-Policy and Transmission: change in data by the lecturer on their subject
should be immediately available to use by students and should not violate any rules and
policies.
22. Availability-Education and Storage: Material stored in the university database needs to be
updated and ready to use by a student at any moment.
23. Availability-Education and Processing: If any changes are to be made in lecture slides or
any data. Authorized personnel needs to access it and ready to be used.
24. Availability-Education and Transmission: always ready to use data should be in the
system so that students can utilize and download whenever they require.
25. Availability-Technology and Storage: All necessary documents related to student store in
the university database system after being checked and verified as correct, so the
student can utilize and download flawlessly
26. Availability-Technology and Processing: The data on the university system should be
available to be edited by a responsible person whenever an issue is found on available
data.
27. Availability-Technology and Transmission: All necessary documents need to be
accessible to students and lecturers to download or modify based on privileges at any
time they want.
15