IAS - Week 2-3
IAS - Week 2-3
Security
Module 2
Introduction
The same phases used in the traditional SDLC can be adapted to support the
implementation of an information security project. While the two processes may
differ in intent and specific activities, the overall methodology is the same. At its
COURSE MODULE
Topic 1
Security Mindset:
Managed Paranoia
They are out to get me..
How could they get me?
Do I care?
What is the real risk?
What countermeasures can I apply to mitigate the risks
(threats)?
Where am I vulnerable?
What will it cost to fix it?
Is it worth it?
Apply countermeasure…
Attacks teach you many things.
It is important to know you’ve been attacked!
You must design and build security into a system, bolting it on
after just doesn’t work.
Patches suck, but you have to fix known vulnerabilities or your
insurance company won’t pay damages and you might get
thrown in jail… especially if you work with medical or personnel
records.
Still want to be an IT major?
That’s why they pay us the big bucks…
The organizational hierarchy and the bottom-up and top-down approaches are
illustrated in Figure 1-9.
COURSE MODULE
The traditional SDLC consists of six general phases. If you have taken
a system analysis and design course, you may have been exposed to a
model consisting of a different number of phases. SDLC models range from
having three to twelve phases, all of which have been mapped into the six
presented here. The waterfall model pictured in Figure 1-10 illustrates that
each phase begins with the results and information gained from the previous
phase.
The investigation phase
COURSE MODULE
Table 1-2 summarizes the steps performed in both the systems development
life cycle and the security systems development life cycle.
COURSE MODULE
TRY THIS!
1. What are the three components of the C.I.A. triangle? What are they
used for?
2. Identify the six components of an information system. Which are most
directly affected by the study of computer security? Which are most
commonly associated with its study?
3. Why is a methodology important in the implementation of information
security? How does a methodology improve the process?
Case Exercises
The next day at SLS found everyone in technical support busy restoring computer
systems to their former state and installing new virus and worm control software.
Amy found herself learning how to install desktop computer operating systems and
applications as SLS made a heroic effort to recover from the attack of the previous
day.
Questions:
1. Do you think this event was caused by an insider or outsider? Why do you
think this?
2. Other than installing virus and worm control software, what can SLS do to
prepare for the next incident?
3. Do you think this attack was the result of a virus or a worm? Why do you
think this?
Reference
Whitman, M. E. et.al. (2012). Principles of Information Security.
Cengage Learning.
COURSE MODULE
Prepared by:
JUDIELYN L. CUALBAR
Instructor