6 CS1FC16 Information Security
6 CS1FC16 Information Security
Introduction
Information security is concerned with "protecting information and information systems from
unauthorized access, use, disclosure, modification, disruption or destruction".
From the computer security point of view it mainly covers:
Data security
Computer security
Network security
Information security is also concerned with:
Application security – good practice in programming
Security operations – day to day management of security functions in a computer system
Physical security – IT infrastructure security, good practice in using computer system.
FIPS199 characterization
Confidentiality – preserving authorized restrictions on information access and disclosure,
including means of protecting personal privacy and proprietary information. A loss of
confidentiality is the unauthorized disclosure of information.
Integrity – guarding against improper information modification or destruction. A loss of integrity
is the unauthorized modification or destruction of information.
Availability – ensuring timely and reliable access to and use of the information. A loss of
availability is the disruption of access to or use of the information.
Types of threats
Virus – infects a computer by inserting itself into a program. When the program is launched, the
virus is executed too.
Worm – an autonomous program that transfers itself through a network, takes up residence in a
computer and forwards copies of itself to other computers
Trojan horse – a program disguised as a desirable application but after execution performs
malicious activities in the background
Spyware – software that collects information about activities on a computer
Phishing – obtaining information by posing as an institution and asking for it
Spam – unwanted junk mail, often a medium for phishing and spreading viruses
A computer in a network can also be attacked by software being executed on other computers in the
system, e.g. denial of service (DoS) - overloading a computer with messages – usually done by planting
software on numerous machines that generate messages when a signal is given
Prevention
Computer security strategy should involve 3 aspects:
Policy – what is the security scheme supposed to do?
Developing a security policy is the first step in devising security services. A security policy is a
description of the desired system behavior.
o Factors to consider:
Value of the assets
System vulnerabilities
Potential threats, likelihood of attacks
o Trade-offs
Ease of use vs security
Cost of security vs cost of failure and recovery
Security policy is a business decision, possibly influenced by legal requirements.
Implementation – how does it do it?
o Prevention – an ideal scheme is one in which no attack is successful
o Detection – in a number of cases, absolute protection is not feasible, but it is practical to
detect security attacks
o Response – if an attack is detected, the system may be able to stop it and prevent
further damage
o Recovery after an attack
Assurance and evaluation – does it really work?
o Assurance – degree of confidence that the security measures work as intended
o Evaluation – process of examining a system with respect to certain criteria
Network security
Primary prevention technique is to filter traffic passing through a certain point – usually with a
firewall
Proxy server – software unit that acts as an intermediary between a client and a server –
shielding the client from possible adverse actions of the server
Network auditing software – administrator's tools for identifying problems before they get out
of control
Antivirus software – detects and removes known viruses
Data is often encrypted to protect its confidentiality. Many traditional Internet applications have secure
versions, e.g. HTTPS is a secure version of HTTP. It works on Secure Socket Layer (SSL) protocol system
and uses public key encryption.