unit-1-introduction-to-information-security
unit-1-introduction-to-information-security
Protecting sensitive information: Information security helps protect sensitive information from being
accessed, disclosed, or modified by unauthorized individuals. This includes personal information,
financial data, and trade secrets, as well as confidential government and military information.
Mitigating risk: By implementing information security measures, organizations can mitigate the risks
associated with cyber threats and other security incidents. This includes minimizing the risk of data
breaches, denial-of-service attacks, and other malicious activities.
Preventing Cyber-attacks: Cyber-attacks, such as viruses, malware, phishing are becoming increasingly
sophisticated and frequent. Information security helps prevent these attacks and minimizes their impact
if they do occur.
Protecting Employee Information: Organizations also have a responsibility to protect employee data, such
as payroll records, health information, and personal details. This information is often targeted by
cybercriminals, and its theft can lead to identity theft and financial fraud.
Active attacks
An active attack involves modification of transmitted data, or the creation of new false data streams.
There are four sub-categories here:
1. masquerade or fabrication,
2. message modification
3. message replay, and
4. denial of service (DoS)
1. Masquerade attacks: It takes place when one entity pretends to be a different entity.
For example: authentication sequences can be captured and replayed after a valid authentication
sequences has taken place.
2. Message replay it involves the passive capture of a data and its subsequent retransmission to produce
an unauthorized effect.
3. Message modification: To produce an authorized effect, some portion of message is altered or that
messages are delayed or reordered.
It disrupts network services either by disabling the network or overloading server with useless
messages.
Denial-of-Service Attack
It is Active attack.
It is a special kind of Internet attack aimed at large websites.
In DoS attack, disruption (interruption) of an entire network is done either by disabling the
network or by overloading it with messages.
DoS attack, is an explicit attempt to make a computer resource unavailable by flooding the
network with useless traffic.
It attempts to "flood" a network, thereby preventing legal network traffic.
It attempts to disrupt (interrupt) connections between two machines, thereby preventing access
to a service.
It attempts to prevent a particular individual from accessing a service
In DoS, One computer and one internet connection is used to flood server.
Effect of DoS attack:
Slow network performance
Unavailability of a particular website
In ability to access any web site
Passive Attack: Attempts to learn or make use of information from the system but does not affect
system resources.
Passive attacks are very hard to detect because they don’t damage or change the information.(so
you can’t tell they have been attacked.)
In this type of passive attack a mail message, phone call or any transferred message would be
intercepted or listened to.
2. Traffic Analysis
Traffic Analysis is a little more complicated. Here the attacker observes the pattern of the message that
is transferred between sender and receiver. Attacker may also observe frequency of occurrences of
message and length of message.
CIA is a model design to guide policy for information security within an organization.
Confidentiality:
It is a set of rules that limits access to information.
It prevents sensitive information from reaching the wrong people.
Confidentiality means that the data is only available to authorized parties.
Information kept private and secure, like account no. when banking online.
Everyone has information they wish to keep a secret. Protecting such information is a very major
part of information security.
When information has been kept confidential it means that it has not been compromised by other
parties; confidential data are not disclosed to people who do not require them or who should not
have access to them.
Example: account number when banking online
To accomplish Confidentiality:
Require strong authentication for any access to data.(password, biometrics etc…)
Use strict access control(Privileges)
Encryption of the data
Integrity:
It maintains consistency and accuracy of data over its entire life cycle.
Integrity of information refers to protecting information from being modified by unauthorized
parties.
Data should not modify, deleted or added in the way of transmission.
Information only has value if it is correct.
If changes occur, a change copy must be available to restore the affected data.
Availability
The prevention of unauthorized use of a resource (i.e. this service controls who can have access to a
resource, under what condition access can occur and what those accessing the resource are allowed to
do.)
The principle of access control decides who should be capable to access information or system through
communication link. It supports the avoidance of unauthorized use of a resource.
In the framework of information security, access control is the capability to check and control the
approach to host systems and applications via communications connection.
3) Data Confidentiality
The principle of confidentiality defines that only the sender and the intended recipient should be
capable to create the element of the message. It protects the transmitted data from passive attack.
Confidentiality can be used at several levels on the basis of content of information to be transmitted.
4) Data Integrity
Data integrity is designed to secure information from modification, insertion, deletion and rehashing
by any entity.
Data integrity can be used to a flow of message, an individual message or a selected portion inside a
message. Data integrity can be used to support total stream protection.