Introduction To Information Security
Introduction To Information Security
Introduction To Information Security
Computing !!!!
Resources of an Organisation
Man
Material
Money
Information
Chapter: Introduction
to Information Security
What is Information?
Types of Information
Information Lifecycle
Information can be:
Created
Processed
Stored
Destroyed ?
Transmitted
Corrupted !
Information System
Definition
A combination of hardware, software,
infrastructure and trained personnel organized
to facilitate planning, control, coordination,
and decision making in an organization.
10
Data
Hardware
Software
Procedures
People (weakest link for security)
11
Widening scope of IS
1950s technical changes
1960-1970- managerial controls
1980-1990- institutional core activities
Today: digital information webs extending beyond the enterprise
IS
Technical
changes
1950s
2000-2005
Time
IS
IS
IS
Vendors,
Institution
customers
Manageria
al core
beyond
l control
activities
the
enterprise
1960s-1970s
1980s1990s
13
What is Security?
The quality or state of being secure--to be free
from danger
To be protected from adversaries
14
15
16
17
The 1960s
Department of Defenses Advanced Research
Project Agency (ARPA) began examining the
feasibility of a redundant networked
communications- to support the militarys
need to exchange information
Larry Roberts developed the project from its
inception
18
The 1990s
Networks of computers became more
common, so too did the need to interconnect
the networks
Resulted in the Internet, the first
manifestation of a global network of networks
In early Internet deployments, security was
treated as a low priority
21
The Present
The Internet has brought millions of computer
networks into communication with each other
many of them unsecured
Ability to secure each now influenced by the
security on every computer to which it is
connected
22
Security facts
All complex software programs have
flaws/bugs
It is extraordinarily difficult to build hardware/
software not vulnerable to attack
23
25
Integrity
Safeguarding
the accuracy
&
completeness are
tions e
offi
information
a
c
i
o th
Modand processing
t
e
d
ma
notmethods
by
Availability
Ensuring that
authorized
users have
access to
information and
associated
assets when
required
data ized
are
r
s
o
m
h
t
t
e
n
Syst
unau nel or
Preve al/u
and
n
o
p
n
s
u
o
r
i
e
t
p
ses
inten tional
s
e
ni ng
c
n
o
u
r
r
p
n
d
rize
h ey
ninte orized
o
t
h
n
t
e
u
wh
are
th
/una
s
ed
n
f
d
o
i
o
e
unau
t
e
e
a
n
r
fic
su
he
are
t
o
modi
t
disclo nts
ade
e
m
t
t
n
o
o
n
c
by
data
zed
i
r
o
h
aut
l or
e
n
n
perso sses
e
ocMobile
Self reading : Security challenges posedprby
Devices Page No 32
s
i
a
onwards from the book ISS- Nina GodboleDat ent
27
t
s
i
s
con
CIA
Confidentiality
Confidentiality refers to limiting information access
and disclosure to authorized users -- "the right
people" -- and preventing access by or disclosure to
unauthorized ones -- "the wrong people."
Authentication methods like user-IDs and
passwords, that uniquely identify data systems'
users and control access to data systems'
resources, strengthen the goal of confidentiality.
28
Integrity
Integrity refers to the trustworthiness of
information resources.
It includes the concept of "data integrity" -namely, that data have not been changed
inappropriately, whether by accident or
deliberate activity.
It also includes "origin" or "source
integrity" -- that is, that the data actually
came from the person or entity you think it
did, rather than an imposter.
29
Availability
Availability refers to the availability of information
resources.
An information system that is not available when you
need it is almost as bad as none at all.
Availability, like other aspects of security, may be
affected by purely technical issues (e.g., a
malfunctioning part of a computer or communications
device), natural phenomena (e.g., wind or water), or
human causes (accidental or deliberate).
Eg. DOS, DDOS.
31
example
Confidentiality: only sender, intended receiver should understand
message contents
Sender encrypts
Receiver decrypts
Message integrity: sender, receiver wants to know that message not
altered (in transit or afterwards)
Access & availability: services must be accessible and available to
authorized users
Authentication: sender, receiver want to confirm identity of each other
Accountability (Non repudiation) : assurance that any transaction that
take place can be subsequently be proved to have taken place. Both the
sender & the receiver agree that the exchange took place
32
Additional Objective
Accountability : involves actions of an entity
can be traced uniquely to that entity, supports
non repudiation, deterrence, fault isolation,
intrusion, detection and prevention.
Non-repudiation implies one's intention to
fulfill their obligations to a contract. It also
implies that one party of a transaction cannot
deny having received a transaction nor can the
other party deny having sent a transaction.
33
Network
Eavesdroppin
g
Network
Sniffing
36
37
38
40
Confidentialit
y
Ensuring that
information is
accessible only
to those
authorized to
have access
Disclosure
Integrity
Availability
Safeguarding
the accuracy
&
completeness
of information
and processing
methods
Ensuring that
authorized
users have
access to
information and
associated
assets when
required
Alteration
Destruction
41
FIGURE 1-1
Components of Information Security
42
14-43
45
46
Bottom Up Approach
Security from a grass-roots effort when
systems administrators attempt to improve the
security of their systems
Key advantage - technical expertise of the
individual administrators
Seldom works, as it lacks a number of critical
features:
participant support
organizational staying power
49
50
51
53
Control in IT environment
Controlling function
Determining when the actual activities of the
information system function deviates from the
planned activities
How much should the organization be spending
on the information system functions?
Look for industry averages- benchmarking
Network-level threats
-
55
57
What is an ISMS?
The ISO/IEC 27000 standard defines it as: "A model for establishing,
implementing, operating, monitoring, reviewing, maintaining and improving
the protection of information assets to achieve business objectives based
upon a risk assessment and the organization's risk acceptance levels
designed to effectively treat and manage risks".
BSI (the British Standards Institution) defines it as: "A systematic approach
to managing sensitive company information so that it remains secure. It
encompasses people, processes and IT systems".
Features of ISMS
Stress on continual process improvement
Scope covers information security not only IT
Security
Focused on people, process and technology
Combination of Management, Operational &
Technical controls
Adopted PDCA model
62
63
Benefits of ISMS
Signal of reliability for your stakeholders, as it
demonstrates that security of their information
is taken seriously
Helps provide a competitive edge to the
company
Improves risk management and reduces risks
Improves efficiency of operations
Tool to ensure your businesss continuity
64
65
ISMS - Framework
1. Definition of Security Policy
2. Definition of ISMS Scope
3. Risk Assessment (as part of Risk
Heart of
ISMS
Management)
4. Risk Management
5.Selection of Appropriate Controls and
6. Statement of Applicability
operative actions required for the technical implementation,
maintenance and control of security measurements.
66
68
Create WBS
Identify Stakeholders or the resources required to
conduct the work identified in the WBS
Identify Proposed time (start & end date) line for
each items identified in WBS
Approval from the ISMS association
69
70
71
72
73
Risk Identification
Risk identification is the determination of
threats and vulnerabilities that could lead to an
adverse event.
The focus is on the nature and source of the
risk such as:
What could happen or go wrong?
How could it happen?
Why can it happen?
Who or what can be harmed?
74
Risk Analysis
Once the risk against any asset is identified,
the risk is analyzed based upon two factors,
Likelihood of risk materializing and the
Consequence of risk materialization to the --organisation.
75
76
77
79
80
81
82
83
86
91
It is also good practice to document the justification of why those controls not
selected were excluded.
92
Level 4
93
94