0% found this document useful (0 votes)
7 views

Basics of Infosec Summary

infosec
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

Basics of Infosec Summary

infosec
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

BASICS OF INFOSEC SUMMARY

Data and Information:

 Data: Raw facts such as numbers, text, images, audio, or video.

 Information: Data organized in a meaningful way to add value beyond the individual facts.

Information Security:

 Ensures protection of crucial information, including the hardware and software used to store
and transmit it.

Threat and Vulnerability:

 Threat: A potential event that can cause harm to your information system.

 Vulnerability: Weakness in the system that exposes it to threats.

Principles of Information System Security:

 INFOSEC: Protects computers, networks, and associated data.

 CIA: Core objectives: Confidentiality, Integrity, Availability.

Confidentiality:

 Ensures information is not disclosed to unauthorized individuals, entities, or processes.

Integrity:

 Maintains accuracy and completeness of data, preventing unauthorized changes.

Availability:

 Ensures information is accessible when needed.

Other Principles:

 Non-repudiation: Parties can't deny sending or receiving a message.

 Authenticity: Verifies the legitimacy of users and data sources.

Balancing Information Security and Access:

 Organizations aim to protect users' interests while providing necessary information.

 Security measures are crucial to prevent unauthorized access.

 Maintaining a balance is essential because absolute security is impractical.

Why Information Security Matters:

 Rapid internet growth and commercialization increase vulnerability.


 Legal concerns, theft of confidential data, financial frauds, and rising cybercrime rates
emphasize the need for security.

Good Habits for Information Security:

 Use official software and keep it updated.

 Limit personal information shared on social media.

 Dispose of waste material carefully.

 Download free software from original sources.

 Secure email usage, strong firewall, and antivirus installation.

 Use strong passwords and regularly back up crucial data.

Question:

 The First Phase Of Hacking An IT System Is Compromise Of Which Foundation Of Security?

 Availability

 Confidentiality

 Integrity

 Authentication

Conclusion:

 Information Assurance, maintaining CIA (Confidentiality, Integrity, Availability), is essential.

 Information security offers various specialization areas, ensuring secure networks, applications,
and business continuity planning.

Importance of Information Systems in Business:

 Effective management of financial and organizational data is crucial for successful businesses.

 Reliable and accurate data ensures smooth workflow and informed decision-making.

 Information systems improve decision-making, planning, and overall business outcomes.

How Information Systems Influence Modern Business:

 Innovation and adaptation to evolving customer needs are vital for competitiveness.

 Success hinges on the quality of information technology and its effective utilization.

Benefits of Information Systems:

 Improved Competitiveness: IS enhances efficiency in internal and external processes.

 New Products and Services: Facilitates analysis of independent processes for innovation.
 Information Storage: Efficiently stores operational data, communication records, and
documents.

 Easier Decision Making: Provides necessary information for better decision-making processes.

 Behavioral Change: Enhances communication between employers and employees.

Question:

 Which Of The Following Is Not A Factor In Securing The Environment Against An Attack On
Security?

 The System Configuration

 The Business Strategy Of The Company

 The Education Of The Attacker

 The Network Architecture

Conclusion:

 Information Assurance ensures the integrity of data, critical for business continuity.

 The field of information security offers numerous specialization areas, from securing networks
to business continuity planning.

Importance of Information Systems in Business:

 Proper management of financial and organizational data is crucial.

 Reliable data enables informed decision-making, efficient operations, and better results.

Question:

 Firewalls are to protect against

 Virus Attacks

 Fire Attacks

 Data Driven Attacks

 Unauthorized Attacks

Business Communication Systems:

 IS facilitates efficient communication and collaboration among employees.

 Managers can distribute information systematically, allowing employees to collaborate


effectively.

Business Operations Management:

 IS provides comprehensive and up-to-date information for efficient operations.


 Helps in gaining a cost advantage, offering better customer service, and streamlining operations.

Company Decision-Making:

 IS aids in making informed decisions by providing accurate and timely information.

 Enables running different scenarios to determine the most beneficial course of action.

Question:

 What is called periodic assessment of security vulnerability in a computer system?

 Threat

 Attack

 Hacking

 Security audit

Company Record-Keeping:

 IS efficiently stores documents, communication records, and operational data.

 Organized data assists in preparing cost estimates, forecasts, and analyzing business impacts.

Certainly! Let's delve into each aspect in more detail:

Why Security Matters:

 Cyberspace poses risks due to the large number of users and machines accessing it.

 Internal threats, such as disgruntled employees or accidental actions like data deletion, can
compromise sensitive data or reputation.

 Access to hacking tools and information has become easier, increasing the success rate of
attacks.

What is Computer Security:

 Computer security is the protection of computer systems and information from harm, theft, and
unauthorized use.

 It encompasses various measures and practices to prevent and detect unauthorized access or
misuse of computer systems.

What to Secure:

 Physical security: Implementing measures like motion alarms, access control systems, and
surveillance cameras to protect hardware and infrastructure.

 User authentication: Ensuring that individuals accessing computer systems have their own user
IDs and passwords.
 Network security: Securing networks, especially wireless ones, with passwords and encryption
to prevent unauthorized access.

 Data encryption: Encrypting sensitive information, both at rest and in transit, to prevent
unauthorized interception or access.

Approaches to Information Security Implementation:

1. Bottom-Up Approach:

 In this approach, system administrators or cybersecurity experts take the lead in


implementing security measures.

 Individuals with technical expertise address system vulnerabilities and design a secure
information security model.

 Advantages: Technical expertise ensures thorough vulnerability assessment and security


model design.

 Disadvantages: Lack of cooperation with senior management may lead to misalignment


with organizational requirements and strategies.

2. Top-Down Approach:

 Initiated by executives and top management, who formulate policies, set priorities, and
allocate resources for security implementation.

 Policies and procedures are outlined, and liability for actions is determined.

 Provides strong support from top management, ensuring commitment of resources and
alignment with organizational strategies.

 Offers opportunities to influence corporate culture towards a security-conscious


environment.

Hacktivism:

 Hacktivism refers to performing hacking activities with the intent of gaining visibility for an
unfair situation or promoting a social or political cause.

These measures and strategies collectively contribute to maintaining the integrity, confidentiality, and
availability of organizational data and systems

Security Services:

 Security services enhance the security of data processing systems and information transfers
within an organization.

 These services aim to counter security attacks and utilize one or more security mechanisms.
 Basic security services include confidentiality, integrity, authentication, source authentication,
authorization, and non-repudiation.

 Cryptographic and non-cryptographic tools support these services, but no single cryptographic
mechanism can provide all services.

1. Confidentiality:

 Prevents disclosure of information to unauthorized parties.

 Encryption is used to make information unreadable to unauthorized users.

 Requires careful design and implementation of cryptographic algorithms and modes of


operation.

2. Data Integrity:

 Provides assurance that data has not been unauthorizedly modified.

 Digital signatures or message authentication codes detect modifications, whether accidental or


deliberate.

3. Authentication:

 Verifies the integrity of data and the identity of its source.

 Digital signatures, message authentication codes, and key-agreement techniques are used for
authentication.

4. Authorization:

 Grants permission for security functions or activities.

 Often supported by cryptographic services and granted after successful source authentication.

5. Non-repudiation:

 Binds a certificate subject to a public key using digital signature keys and certificates.

 Ensures that a digital signature has the support of integrity and source authentication services.

6. Support Services:

 Required for basic cryptographic security services.

 Includes key establishment, random number generation, and protection of cryptographic keys.

Combining Services:

 It is advisable to combine the above security services when designing a secure system.

 System designers determine the necessary security systems based on the information to be
protected.

 Mechanisms best suited to provide these services are then considered and implemented.
Managing the Keys:

 Proper management of cryptographic keys is essential for achieving security through


cryptography.

 The achievable security level depends on factors such as cryptographic system architecture and
the applied mix of mechanisms.

Information Security Policy:

 An Information Security Policy (ISP) consists of rules guiding individuals in using IT assets.

 It ensures that employees and users follow security protocols and procedures, restricting access
to sensitive systems and information.

 Regular updates based on company changes, new threats, previous breaches, and changes to
security systems are necessary to maintain an effective policy.

 The policy should be practical and reasonable, with a system of exceptions and an approval
process for specific circumstances.

 Information Security Threats:

 1. Unsecure or Poorly Secured Systems:

 Speed and technological advancements often compromise security measures.

 Legacy systems developed without security considerations pose risks.

 Mitigation involves securing or patching systems, decommissioning, or isolating them.

 2. Social Media Attacks:

 Attackers exploit social media platforms to spread malware or gather information for designing
attacks.

 Users inadvertently share personal information, making them vulnerable to indirect attacks.

 3. Social Engineering:

 Attackers manipulate users through emails or messages to divulge sensitive information or


perform compromising actions.

 Psychological triggers like curiosity, urgency, or fear are used to deceive users.

 Mitigation involves user awareness training and implementing technological systems to block or
prevent dangerous actions.

 4. Malware on Endpoints:

 Endpoint devices like computers, laptops, tablets, and mobile phones are susceptible to
malware.

 Malware compromises endpoints and can escalate privileges to other organizational systems.
 Traditional antivirus software may not be sufficient, necessitating advanced approaches like
Endpoint Detection and Response (EDR).

 5. Lack of Encryption:

 Encryption encodes data to prevent unauthorized access, especially in case of device loss, theft,
or system compromise.

 Often overlooked due to complexity and lack of legal obligations, but increasingly adopted by
organizations.

 6. Security Misconfiguration:

 Organizations use various technological platforms and tools, which require proper security
configuration.

 Negligence or human error in configuration can lead to security breaches.

 "Configuration drift" poses a risk as correct configurations become outdated over time.

 Mitigation involves continuous monitoring, identifying configuration gaps, and automatic


remediation of vulnerabilities.

You might also like