Basics of Infosec Summary
Basics of Infosec Summary
Information: Data organized in a meaningful way to add value beyond the individual facts.
Information Security:
Ensures protection of crucial information, including the hardware and software used to store
and transmit it.
Threat: A potential event that can cause harm to your information system.
Confidentiality:
Integrity:
Availability:
Other Principles:
Question:
Availability
Confidentiality
Integrity
Authentication
Conclusion:
Information security offers various specialization areas, ensuring secure networks, applications,
and business continuity planning.
Effective management of financial and organizational data is crucial for successful businesses.
Reliable and accurate data ensures smooth workflow and informed decision-making.
Innovation and adaptation to evolving customer needs are vital for competitiveness.
Success hinges on the quality of information technology and its effective utilization.
New Products and Services: Facilitates analysis of independent processes for innovation.
Information Storage: Efficiently stores operational data, communication records, and
documents.
Easier Decision Making: Provides necessary information for better decision-making processes.
Question:
Which Of The Following Is Not A Factor In Securing The Environment Against An Attack On
Security?
Conclusion:
Information Assurance ensures the integrity of data, critical for business continuity.
The field of information security offers numerous specialization areas, from securing networks
to business continuity planning.
Reliable data enables informed decision-making, efficient operations, and better results.
Question:
Virus Attacks
Fire Attacks
Unauthorized Attacks
Company Decision-Making:
Enables running different scenarios to determine the most beneficial course of action.
Question:
Threat
Attack
Hacking
Security audit
Company Record-Keeping:
Organized data assists in preparing cost estimates, forecasts, and analyzing business impacts.
Cyberspace poses risks due to the large number of users and machines accessing it.
Internal threats, such as disgruntled employees or accidental actions like data deletion, can
compromise sensitive data or reputation.
Access to hacking tools and information has become easier, increasing the success rate of
attacks.
Computer security is the protection of computer systems and information from harm, theft, and
unauthorized use.
It encompasses various measures and practices to prevent and detect unauthorized access or
misuse of computer systems.
What to Secure:
Physical security: Implementing measures like motion alarms, access control systems, and
surveillance cameras to protect hardware and infrastructure.
User authentication: Ensuring that individuals accessing computer systems have their own user
IDs and passwords.
Network security: Securing networks, especially wireless ones, with passwords and encryption
to prevent unauthorized access.
Data encryption: Encrypting sensitive information, both at rest and in transit, to prevent
unauthorized interception or access.
1. Bottom-Up Approach:
Individuals with technical expertise address system vulnerabilities and design a secure
information security model.
2. Top-Down Approach:
Initiated by executives and top management, who formulate policies, set priorities, and
allocate resources for security implementation.
Policies and procedures are outlined, and liability for actions is determined.
Provides strong support from top management, ensuring commitment of resources and
alignment with organizational strategies.
Hacktivism:
Hacktivism refers to performing hacking activities with the intent of gaining visibility for an
unfair situation or promoting a social or political cause.
These measures and strategies collectively contribute to maintaining the integrity, confidentiality, and
availability of organizational data and systems
Security Services:
Security services enhance the security of data processing systems and information transfers
within an organization.
These services aim to counter security attacks and utilize one or more security mechanisms.
Basic security services include confidentiality, integrity, authentication, source authentication,
authorization, and non-repudiation.
Cryptographic and non-cryptographic tools support these services, but no single cryptographic
mechanism can provide all services.
1. Confidentiality:
2. Data Integrity:
3. Authentication:
Digital signatures, message authentication codes, and key-agreement techniques are used for
authentication.
4. Authorization:
Often supported by cryptographic services and granted after successful source authentication.
5. Non-repudiation:
Binds a certificate subject to a public key using digital signature keys and certificates.
Ensures that a digital signature has the support of integrity and source authentication services.
6. Support Services:
Includes key establishment, random number generation, and protection of cryptographic keys.
Combining Services:
It is advisable to combine the above security services when designing a secure system.
System designers determine the necessary security systems based on the information to be
protected.
Mechanisms best suited to provide these services are then considered and implemented.
Managing the Keys:
The achievable security level depends on factors such as cryptographic system architecture and
the applied mix of mechanisms.
An Information Security Policy (ISP) consists of rules guiding individuals in using IT assets.
It ensures that employees and users follow security protocols and procedures, restricting access
to sensitive systems and information.
Regular updates based on company changes, new threats, previous breaches, and changes to
security systems are necessary to maintain an effective policy.
The policy should be practical and reasonable, with a system of exceptions and an approval
process for specific circumstances.
Attackers exploit social media platforms to spread malware or gather information for designing
attacks.
Users inadvertently share personal information, making them vulnerable to indirect attacks.
3. Social Engineering:
Psychological triggers like curiosity, urgency, or fear are used to deceive users.
Mitigation involves user awareness training and implementing technological systems to block or
prevent dangerous actions.
4. Malware on Endpoints:
Endpoint devices like computers, laptops, tablets, and mobile phones are susceptible to
malware.
Malware compromises endpoints and can escalate privileges to other organizational systems.
Traditional antivirus software may not be sufficient, necessitating advanced approaches like
Endpoint Detection and Response (EDR).
5. Lack of Encryption:
Encryption encodes data to prevent unauthorized access, especially in case of device loss, theft,
or system compromise.
Often overlooked due to complexity and lack of legal obligations, but increasingly adopted by
organizations.
6. Security Misconfiguration:
Organizations use various technological platforms and tools, which require proper security
configuration.
"Configuration drift" poses a risk as correct configurations become outdated over time.