CW3551-DIS Unit 1 Notes
CW3551-DIS Unit 1 Notes
CW3551-DIS Unit 1 Notes
1.1 HISTORY
Julius Caesar-Caesar Cipher c50 B.C., which was created in order to prevent his secret
messages from being, read should a message fall into the wrong hands.
The end of the 20th century and early years of the 21st century saw rapid advancements in
telecommunications, computing hardware and software, and data encryption.
Introduction
Because this new concept covers a broader range of issues, from the protection of data to
the protection of human resources, information security is no longer the sole responsibility of a
discrete group of people in the company; rather, it is the responsibility of every employee, and
especially managers.
Organizations must realize that information security funding and planning decisions
involve more than just technical managers: Rather, the process should involve three distinct
groups of decision makers, or communities of interest:
The information security community protects the organization’s information assets from
the many threats they face.
Understanding the technical aspects of information security requires that you know the
definitions of certain information technology terms and concepts. In general, security is defined
as “the quality or state of being secure—to be free from danger.”
Physical security, which encompasses strategies to protect people, physical assets, and
the workplace from various threats including fire, unauthorized access, or natural
disasters
Personal security, which overlaps with physical security in the protection of the people
within the organization
Operations security, which focuses on securing the organization’s ability to carry out its
operational activities without interruption or compromise
Confidentiality
Integrity
Availability(CIA)
CIA Triangle
The C.I.A. triangle - confidentiality, integrity, and availability - has expanded into a more
comprehensive list of critical characteristics of information. At the heart of the study of
information security is the concept of policy. Policy, awareness, training, education, and
technology are vital concepts for the protection of information and for keeping information
systems from danger.
Confidentiality
Integrity
Availability
Privacy
Identification
Authentication
Authorization
Accountability
Accuracy
Utility
Possession
1.3.1 Confidentiality
Confidentiality of information ensures that only those with sufficient privileges may
access certain information. When unauthorized individuals or systems can access information,
confidentiality is breached. To protect the confidentiality of information, a number of measures
are used:
Information classification
Integrity
Integrity is the quality or state of being whole, complete, and uncorrupted. The integrity
of information is threatened when it is exposed to corruption, damage, destruction, or other
disruption of its authentic state. Corruption can occur while information is being compiled,
stored, or transmitted.
Eg: Integrity is violated when an employee deletes important data files, when a computer
virus infects a computer, when an employee is able to modify his own salary in a payroll
database, when an unauthorized user vandalizes a website, when someone is able to cast a
very large number of votes in an online poll, and so on.
1.3.2 Availability
For any information system to serve its purpose, the information must be available when
it is needed.
Eg: High availability systems aim to remain available at all times, preventing service
disruptions due to power outages, hardware failures, and system upgrades.
Privacy
The information that is collected, used, and stored by an organization is to be used only
for the purposes stated to the data owner at the time it was collected. This definition of privacy
does focus on freedom from observation (the meaning usually associated with the word), but
rather means that information will be used only in ways known to the person providing it.
Identification
Authentication
Authentication occurs when a control provides proof that a user possesses the identity
that he or she claims.
In computing, e-Business and information security it is necessary to ensure that the data,
transactions, communications or documents(electronic or physical) are genuine(i.e. they
have not been forged or fabricated)
Authorization
Accountability
The characteristic of accountability exists when a control provides assurance that every
activity undertaken can be attributed to a named person or automated process. For example, audit
logs that track user activity on an information system provide accountability.
1.3.3 Accuracy
Information should have accuracy. Information has accuracy when it is free from
mistakes or errors and it has the value that the end users expects. If information contains a value
different from the user’s expectations, due to the intentional or unintentional modification of its
content, it is no longer accurate.
Utility
Information has value when it serves a particular purpose. This means that if information
is available, but not in a format meaningful to the end user, it is not useful. Thus, the value of
information depends on its utility.
Possession
It is now called the National Training Standard for Information security professionals.
While the NSTISSC model covers the three dimensions of information security, it omits
discussion of detailed guidelines and policies that direct the implementation of controls.
Another weakness of using this model with too limited an approach is to view it from a single
perspective.
The 3 dimensions of each axis become a 3x3x3 cube with 27 cells representing areas
that must be addressed to secure today’s Information systems.
To ensure system security, each of the 27 cells must be properly addressed during the
security process.
For example, the intersection between technology, Integrity & storage areas requires
a control or safeguard that addresses the need to use technology to protect the
Integrity of information while in storage.
1.5 COMPONENTS OF AN INFORMATION SYSTEM
Software
Hardware
Data
People
Procedures
Networks
1.5.1 Software
Software programs are the vessels that carry the lifeblood of information through an
organization. These are often created under the demanding constraints of project
management, which limit time, cost, and manpower.
1.5.2 Hardware
Hardware is the physical technology that houses and executes the software, stores and
carries the data, and provides interfaces for the entry and removal of information from the
system.
Physical security policies deal with hardware as a physical asset and with the protection
of these physical assets from harm or theft. Applying the traditional tools of physical
security, such as locks and keys, restricts access to and interaction with the hardware
components of an information system.
Securing the physical location of computers and the computers themselves is important
because a breach of physical security can result in a loss of information. Unfortunately,
most information systems are built on hardware platforms that cannot guarantee any level
of information security if unrestricted access to the hardware is possible.
1.5.3 Data
Data stored, processed, and transmitted through a computer system must be protected.
Data is often the most valuable asset possessed by an organization and is the main target
of intentional attacks.
The raw, unorganized, discrete(separate, isolated) potentially-useful facts and figures that
are later processed(manipulated) to produce information.
1.5.4 People
There are many roles for people in information systems. Common ones include
Systems Analyst
Programmer
Technician
Engineer
Network Manager
1.5.5 Procedures
1.5.6 Networks
When information systems are connected to each other to form Local Area Network
(LANs), and these LANs are connected to other networks such as the Internet, new
security challenges rapidly emerge.
Steps to provide network security are essential, as is the implementation of alarm and
intrusion systems to make system owners aware of ongoing compromises.
Protecting the components from potential misuse and abuse by unauthorized users.
Subject of an attack
Object of an attack
1. Direct attack
2. Indirect attack
Internet
Stolen Information
REMOTE
Hacker request SYSTEM
SYSTEM
2. Indirect attack
[Originate from a system or resource that itself has been attacked, and is malfunctioning or
working under the control of a threat].
A computer can, therefore, be both the subject and object of an attack when ,for
example, it is first the object of an attack and then compromised and used to attack other
systems, at which point it becomes the subject of an attack.
Has to provide the security and is also feasible to access the information for its
application.
Top-down-approach
Project is initiated by upper level managers who issue policy & procedures &
processes.
Investigation
Analysis
Logical design
Physical design
Implementation
It is the most important phase and it begins with an examination of the event or plan
that initiates the process.
During this phase, the objectives, constraints, and scope of the project are specified.
At the conclusion of this phase, a feasibility analysis is performed, which assesses the
economic, technical and behavioral feasibilities of the process and ensures that
implementation is worth the organization’s time and effort.
1.8.2 Analysis
Analysts begin by determining what the new system is expected to do, and how it will
interact with existing systems.
This phase ends with the documentation of the findings and an update of the feasibility
analysis.
In this phase, the information gained from the analysis phase is used to begin creating a
systems solution for a business problem.
Based on the business need, applications are selected that are capable of providing
needed services.
Based on the applications needed, data support and structures capable of providing the
needed inputs are then chosen.
In this phase, specific technologies are selected to support the solutions developed in
the logical design.
Once all the components are tested individually, they are installed and tested as a
system.
Again a feasibility analysis is prepared, and the sponsors are then presented with the
system for a performance review and acceptance test.
It consists of the tasks necessary to support and modify the system for the remainder of
its useful life cycle.
As the needs of the organization change, the systems that support the organization must
also change.
When a current system can no longer support the organization, the project is terminated
and a new project is implemented.
The same phases used in the traditional SDLC can be adapted to support the
implementation of an information security project.
Investigation
This phase begins with a directive from upper management, dictating the process,
outcomes, and goals of the project, as well as its budget and other constraints.
Frequently, this phase begins with an enterprise information security policy, which
outlines the implementation of a security program within the organization.
Scope of the project, as well as specific goals and objectives, and any additional
constraints not covered in the program policy, are defined.
Analysis
In this phase, the documents from the investigation phase are studied.
Risk management is the process of identifying, assessing, and evaluating the levels of
risk facing the organization, specifically the threats to the organization’s security and to the
information stored and processed by the organization.
Logical design
This phase creates and develops the blueprints for information security, and examines
and implements key policies.
Physical design
In this phase, the information security technology needed to support the blueprint
outlined in the logical design is evaluated.
Designs for physical security measures to support the proposed technological solutions
are created.
At the end of this phase, a feasibility study should determine the readiness of the
organization for the proposed project.
At this phase, all parties involved have a chance to approve the project before
implementation begins.
Implementation
The security solutions are acquired ( made or bought ), tested, implemented, and tested
again
Personnel issues are evaluated and specific training and education programs are
conducted.
Finally, the entire tested package is presented to upper management for final approval.
Senior management
Assessment
Management
Champion
Team Leader
- Personnel management
- existing policies
Security Professionals
- Dedicated
- Trained, and well educated specialists in all aspects of information security from both a
technical and non technical stand point.
System Administrators
- Administrating the systems that house the information used by the organization.
End users
Data owners
Data users
Data Owners
- Work with subordinate managers to oversee the day-to-day administration of the data.
Data Custodians
- Work with the information to perform their daily jobs supporting the mission of the
organization.
- Everyone in the organization is responsible for the security of data, so data users are
included here as individuals with an information security role.
Asset
Attack
Risk
- Risk is the probability that something can happen. In information security, it could be
the probability of a threat to a system.
Security Blueprint
- It is the plan for the implementation of new security measures in the organization.
Sometimes called a frame work, the blueprint presents an organized approach to the
security planning process.
Security Model
Threats
- A threat is a category of objects, persons, or other entities that pose a potential danger
to an asset. Threats are always present. Some threats manifest themselves in accidental
occurrences, while others are purposeful. For example, all hackers represent potential
danger or threat to an unprotected information system. Severe storms are also a threat to
buildings and their contents.
Threat agent
- A threat agent is the specific instance or component of a threat. For example, you can
think of all hackers in the world as a collective threat, and Kevin Mitnick, who was
convicted for hacking into phone systems, as a specific threat agent. Likewise, a
specific lightning strike, hailstorm, or tornado is a threat agent that is part of the threat
of severe storms.
Vulnerability
Exposure
- The exposure of an information system is a single instance when the system is open to
damage. Vulnerabilities can cause an exposure to potential damage or attack from a
threat. Total exposure is the degree to which an organization’s assets are at risk of
attack from a threat..