UNIT 1 - Information Security
UNIT 1 - Information Security
UNIT 1 - Information Security
INFORMATION SECURITY
Course Outcomes (CO)
At the end of this course, learners will be able to:
• Computer Security - to secure physical locations, hardware and software from threats
• In early days, the information security focus on only physical security (protection of building sites
and equipment )and simple document classification scheme
• physical theft of equipment, Spying and destroying the products
• Access to sensitive military locations was controlled by keys, badges and facial recognition by
security guards – Manual Process
• In 1960, the first document security problem occurred where software glitch mixed two files and
entire password was printed in every output file
1960’s
• Mainframe used in large quantity
• Communication between mainframes is too complex
• ARPANET(Advanced research Project Agency)- DoD(Department of Defense)- encryption
devices
• Larry Roberts (Founder of Internet)
• Predecessor of Internet
The 1970s and 1980s
ARPANET grew in popularity as did its potential for misuse
8
MULTICS
• Multiplexed Information and Computing Service
• First Operating system to integrate security into core functions
• Mainframe, time-sharing OS
• UNIX
The 1990s
• Networks of computers became more common; so too did the need to
interconnect networks
11
What is Security?
• Definitions:
– Book: “The quality or state of being secure—to be free from danger”
– James Anderson, Inovant: “Well-informed sense that information risks and controls
are in balance”
– Rita Summers, IBM Systems Journal, 1984: “Includes concepts,
techniques and measures that are used to protect computing
systems and the information they maintain against deliberate or accidental
threats”
• Attack
• An intentional or unintentional act that can damage or otherwise compromise information and the systems
that support it. Active and passive attack- environmental hazards, and computer failures.
• Control, safeguard or countermeasure
• Security mechanisms, policies, or procedures that can successfully counter attacks, reduce risk, resolve
vulnerabilities, and otherwise improve security within an organization
Key Information Security Concepts
• Exploit
• A technique used to compromise a system
• Exposure
• A condition or state of being exposed; when a vulnerability is known to an attacker.
• Loss
• A single instance of an information asset suffering damage or destruction, unintended or
unauthorized modification or disclosure, or denial of use.
• Protection profile or security posture
• The entire set of controls and safeguards, including policy, education, training and awareness,
and technology, that the organization implements to protect the asset
Key Information Security Concepts
• Risk
• The probability of an unwanted occurrence, such as an adverse event or loss
• Subjects and objects
• A computer can be either the subject of an attack—an agent entity used to conduct the attack
—or the object of an attack: the target entity
• Threat
• A category of objects, people, or other entities that represents a danger to an asset
• Threat Agent
• The specific instance or a component of a threat.
• Vulnerability
• A weakness or fault in a system or protection mechanism that opens it to attack or damage.
3.Critical characteristics of information
The value of information comes from the characteristics it possesses.
• Availability
• Accuracy
• Authenticity
• Confidentiality
• Integrity
• Utility
• Possession
Critical characteristics of information
• Availability – Enables users who need to access information to do so
without interference or obstruction and in the required format. The
information is said to be available to an authorized user when and where
needed and in the correct
• Accuracy – Free from mistake or error and having the value that the end
user expects. If information contains a value different from the user’s
expectations due to the intentional or unintentional modification of its
content, it is no longer accurate
• The waterfall model illustrates that each phase begins with the results and
information gained from the previous phase.
• End of each phase the team determines if the project should be continued,
discontinued, outsourced, postponed, or returned to an earlier phase
SDLC contd..
• This determination depends on whether the project is
proceeding as expected/needs additional expertise,
organizational knowledge, or other resources.
Principles of Information
Security, Fourth Edition
• Based on structured sequence of procedures
• Using a methodology:
• Ensures a rigorous process
• Increases probability of success
• Traditional SDLC consists of six general phases
36
Figure 1-10 SDLC Waterfall Methodology
Principles of Information
Security, Fourth Edition
• Feasibility analysis performed
• Assess economic, technical, and behavioural feasibilities
38
Analysis
• Documents from investigation phase are studied
• Analysis of existing security policies or programs
• Analysis of documented current threats and associated controls
• Analysis of relevant legal issues that could impact design of the security solution
Principles of Information
Security, Fourth Edition
• Risk management task begins
39
Logical Design
• Creates and develops blueprints for information security
• Incident response actions planned:
• Continuity planning
• Incident response
Principles of Information
Security, Fourth Edition
• Disaster recovery
• Feasibility analysis to determine whether project should be continued or
outsourced
40
Physical Design
• Needed security technology is evaluated
• Alternatives are generated
• Final design is selected
• At end of phase, feasibility study determines readiness of organization for project
Principles of Information
Security, Fourth Edition
41
Implementation
• Needed software created
• Components ordered, received, and tested
• Users trained and documentation created
• Feasibility analysis prepared
Principles of Information
Security, Fourth Edition
• Users presented with system for performance review and acceptance test
42
Maintenance and Change
• Perhaps the most important phase, given the ever-changing threat environment
• Often, repairing damage and restoring information is a constant duel with an
unseen adversary
• Information security profile of an organization requires constant adaptation as
Principles of Information
new threats emerge and old threats evolve
Systems Analyst
Programmer
Technician
Engineer
Network Manager
MIS ( Manager of Information Systems )
Data entry operator
Components of information system
A procedure is a series of documented actions taken to achieve something. A procedure is
more than a single simple task. A procedure can be quite complex and involved, such as
performing a backup, shutting down a system, patching software.
Components of information system
When information systems are connected to each other to form Local Area Network
(LANs), and these LANs are connected to other networks such as the Internet, new
security challenges rapidly emerge.
SECURING COMPONENTS
Protecting the components from potential misuse and abuse by unauthorized users.
ü Subject of an attack
ü Object of an attack
When a Hacker uses his personal computer to break into a system.[Originate from the threat itself]
2. Indirect attack
Has to provide the security and is also feasible to access the information for its application.
Approaches to Information Security Implementation
Bottom- up- approach.
Bottom-Up Approach
• The responsibility of the system administrator, cyber engineer, or network security professional does not include top-level management positions. T
main duty of such individuals is to secure the information system by using their expertise, knowledge, education, and training to build a highly secu
model.
• Advantages of the Bottom-up Approach
• The individual or team addresses the intricate security of the information system using their expertise. The company threat is identified to mitigate t
possible potential threat.
• The existing team or individual is assigned instead of new hire which is a way to save time, and money in a complex plan. It is a great way to use
available valuable resources.
ü Top-down-approach
- Project is initiated by upper level managers who issue policy & procedures & processes.
SCENARIO: When the bookkeeper began receiving inadequate fund notices for frequently recurring debts,
the CEO of a boutique hotel realized their company had fallen victim to wire fraud. A study of the
accounting records revealed a severe problem. A few weeks prior, the CEO had clicked on a link in an
email that they mistook for an IRS notification. It was not. When they clicked the link and submitted their
credentials, the cybercriminals obtained the CEO's login information, granting them complete access to
sensitive corporate and personal information.
Attack
Impact
Reponse
Lesson learned
Dicuss
resources
ATTACK:
Social engineering, phishing attack. A phishing attack is a form of social engineering by which cyber
criminals attempt to trick individuals by creating and sending fake emails that appear to be from an
authentic source, such as a business or colleague. The email might ask you to confirm personal account
information such as a password or prompt you to open a malicious attachment that infects your computer
with malware.
RESPONSE: The hotel’s cash reserves were depleted. The fraudulent transfers amounted to more than $1
million. The hotel also contacted a cybersecurity firm to help them mitigate the risk of a repeat attack.
IMPACT: The business lost $1 million to an account in China. The funds were not recovered.
LESSONS LEARNED: 1 Teach staff about the dangers of clicking on unsolicited email links and attachments,
and the need to stay alert for warning signs of fraudulent emails. Engage in regular email security
training. 2 Implement stringent wire transfer protocols and include a secondary form of validation. 3
Have a cyber incident response plan ready to implement!
DISCUSS: • Knowing how the firm responded, what would you have done differently? • What are some
steps you think the firm could have taken to prevent this incident? • Is your business susceptible to this
kind of attack? How are you going to reduce your risk? RESOURCES: • NIST Small Business Cybersecurity
Corner: https://www.nist.gov/itl/smallbusinesscyber • National Cybersecurity Alliance:
https://staysafeonline.org/cybersecure-business
https://www.nist.gov/itl/smallbusinesscyber/cybersecurity-basics/case-study-series