Lecture 3-4
Lecture 3-4
Lecture 3-4
Information security, is a set of tools and practices that you can use to
protect your digital and analog information.
InfoSec covers a range of IT domains, including infrastructure and
network security, auditing, and testing.
It uses tools like authentication and permissions to restrict
unauthorized users from accessing private information. These
measures help you prevent harms related to information theft,
modification, or loss.
Types of Information Security
The main objectives of InfoSec are typically related to ensuring
confidentiality, integrity, and availability of company information. it involves
the implementation of various types of security.
Application security.
Application Security, is a security program that directly deals with
applications themselves.
Its goal is to identify, rectify, and correct security issues in applications within
organization.
It is totally based upon identifying and fixing vulnerabilities that correspond to
weakness. Its testing also reveals weakness at application level that help to
prevent attacks.
Types of Information Security
Data Security
Data security means protecting digital data, such as those in a database, from
destructive forces and from the unwanted actions of unauthorized users, such as a
cyberattack or a data breach.
Infrastructure security.
Infrastructure Security deals with the threats, risks, and challenges that
are associated with the security of the organization’s IT infrastructure
such as the host, network, and application levels.
Common security threats to IT infrastructure
Cyber threats to technology infrastructure range from phishing attempts and
ransomware attacks to distributed denial of service (DDoS) exploits and Internet
of Things (IoT) botnets.
Physical dangers include natural disasters such as fires and floods, civil unrest,
utility outages, and theft or vandalism of hardware assets. Any of these have the
potential to cause business disruption, damage an organization’s public reputation,
and have significant financial consequences.
Infrastructure security
Data Security
As more data is generated and stored in more locations (core data centers,
colocations, multiple clouds, and edges), protecting this data becomes more
complex. The increasing number of devices connect to enterprise networks
due to bring-your-own-device (BYOD) policies, IoT adoption, and more,
meaning that a growing number of endpoints, or entry points into enterprise
networks, must be protected.
Some common enterprise endpoint security measures include URL filtering,
anti-virus tools, sandboxing, secure email gateways, and endpoint detection
and response (EDR) tools.
Data encryption technologies also help protect data by encoding it so that
only users with the correct decryption key may access it.
Infrastructure security
What are the different levels of infrastructure security?
Application
Outdated software can contain vulnerabilities that cyber attackers can exploit to
gain access to IT systems. Ensuring software and firmware updates are distributed
and applied across the enterprise network, known as patching, helps close security
holes as well as provide new functionality, performance improvements, and bug fixes
for enterprise applications.
Network
A firewall typically provides the first line of defense in network security. It serves as
a barrier between an enterprise’s trusted network and other untrusted networks,
such as public Wi-Fi. By monitoring incoming and outgoing network traffic based on a
set of rules, it only allows network traffic that has been defined in the security policy
to access resources on the trusted network. Multi-factor authentication (MFA) also
protects the enterprise network by requiring two or more forms of verification before
allowing access to network resources.
Physical
The most robust cyber protection cannot protect your technology assets from
physical theft, vandalism, or natural disasters. Data recovery plans that
incorporate offsite backups located in different geographies are also a part of a
physical security strategy.
Types of Information Security
Mobile Security
Mobile devices are now an essential need for every person for day-to-day
tasks. As a result, the number of mobile users is rising exponentially. This
gives us the direction to think about the data they process and what
security mechanisms are being taken by mobile application developers to
keep the user’s data secure.
There was a time when the biggest threat to the data was due to spyware
which runs silently on the computer background and steals user data.
Now even mobile devices are a fruit target for cyber-criminals to steal
your data without even getting noticed. When it comes to securing mobile
data, use an antivirus application that tends to protect your data from
getting breached.
Three key objectives (the CIA triad)
Confidentiality
Data confidentiality: Assures that confidential information is not
disclosed to unauthorized individuals
Privacy: Assures that individual control or influence what
information may be collected and stored
Integrity
Data integrity: assures that information and programs are changed
only in a specified and authorized manner
System integrity: Assures that a system performs its operations in
unimpaired manner
Availability: assure that systems works promptly and service is not
denied to authorized users
Other concepts to a complete security
picture
Authenticity: the property of being genuine and being
able to be verified and trusted; confident in the validity
of a transmission, or a message, or its originator
Accountability: generates the requirement for actions of
an entity to be traced uniquely to that individual to
support nonrepudiation, deference, fault isolation, etc
Levels of security breach impact
Low: the loss will have a limited impact, e.g., a degradation in mission or
minor damage or minor financial loss or minor harm
Moderate: the loss has a serious effect, e.g., significance degradation on
mission or significant harm to individuals but no loss of life or threatening
injuries
High: the loss has severe or catastrophic adverse effect on operations,
organizational assets or on individuals (e.g., loss of life)
Examples of security requirements:
Confidentiality