Unit 1 DIS
Unit 1 DIS
Date Document
1968 Maurice Wilkes discusses password security in Time - Sharing Computer Systems.
1970 Willis H. Ware author the report Security Controls for Computer Systems: Report of
Defense Science Board Task Force on Computer Security—RAND R.609 which was not
declassified until 1979. I became known as the seminal work identifying the need for
computer Security.
1973 Schell, Downey, and Popek examine the need for additional security in military
systems in Preliminary Notes on the Design of Secure Military Computer Systems.
1975 The Federal Information Processing Standards (FIPS) examines DES (Digital
Encryption Standard) In the Federal Register.
1978 Bisbey and Hollingsworth publish their study “Protection Analysis: Final Report,”
which discussed the Protection Analysis project created by ARPA to better understand
RAJALAKSHMI INSTITUTE OF TECHNOLOGY,
KUTHAMBAKKAM, CHENNAI - 600124
Department of Artificial Intelligence and Data Science
1968 Maurice Wilkes discusses password security in Time - Sharing Computer Systems.
1970 Willis H. Ware author the report Security Controls for Computer Systems: Report of
Defense Science Board Task Force on Computer Security—RAND R.609 which was not
declassified until 1979. I became known as the seminal work identifying the need for
computer Security.
1973 Schell, Downey, and Popek examine the need for additional security in military
systems in Preliminary Notes on the Design of Secure Military Computer Systems.
1975 The Federal Information Processing Standards (FIPS) examines DES (Digital
Encryption Standard) In the Federal Register.
1978 Bisbey and Hollingsworth publish their study “Protection Analysis: Final Report,”
which discussed the Protection Analysis project created by ARPA to better understand
the vulnerabilities of operating system security and examine the possibility of
automated vulnerability detection techniques in existing system software.
The 1960s
• During the 1960s, the Department of Defense’s Advanced Research Procurement Agency
(ARPA) began examining the feasibility of a redundant networked communications
system designed to support the military’s need to exchange information.
• Larry Roberts, known as the founder of the Internet, developed the project from its
inception.
• Advanced Research Projects Agency (ARPA) began to examine the feasibility of
redundant networked communications.
• Larry Roberts developed the ARPANET from its inception.
The 1970s and 80s
• ARPANET grew in popularity, as did its potential for misuse.
RAJALAKSHMI INSTITUTE OF TECHNOLOGY,
KUTHAMBAKKAM, CHENNAI - 600124
Department of Artificial Intelligence and Data Science
The 1990s
• Networks of computers became more common, as did the need to connect them to each
other.
• Internet became the first global network of networks.
• Initially, network connections were based on de facto standards.
RAJALAKSHMI INSTITUTE OF TECHNOLOGY,
KUTHAMBAKKAM, CHENNAI - 600124
Department of Artificial Intelligence and Data Science
• Integrity – The quality or state of being whole, complete, and uncorrupted. The integrity
of information is threatened when the information is exposed to corruption, damage,
destruction, or other disruption of its authentic state.
RAJALAKSHMI INSTITUTE OF TECHNOLOGY,
KUTHAMBAKKAM, CHENNAI - 600124
Department of Artificial Intelligence and Data Science
• Utility – The quality or state of having value for some purpose or end. Information has
value when it serves a particular purpose. This means that if information is available, but
not in a format meaningful to the end user, it is not useful.
• Possession – The quality or state of having ownership or control of some object or item.
Information is said to be in possession if one obtains it, independent of format or other
characteristic. While a breach of confidentiality always results in a breach of possession,
a breach of possession does not always result in a breach of confidentiality.
4. NSTISSC SECURITY MODEL
• ‘National Security Telecommunications & Information systems security
committee’ document.
• It is now called the National Training Standard for Information security
professionals.
• The NSTISSC Security Model provides a more detailed perspective on security.
• While the NSTISSC model covers the three dimensions of information security, it omits
discussion of detailed guidelines and policies that direct the implementation of controls.
• Another weakness of using this model with too limited an approach is to view it from a
single perspective.
o The 3 dimensions of each axis become a 3x3x3 cube with 27 cells representing
areas that must be addressed to secure today’s Information systems.
o To ensure system security, each of the 27 cells must be properly addressed
during the security process.
o For example, the intersection between technology, Integrity & storage areas
requires a control or safeguard that addresses the need to use technology to
protect the Integrity of information while in storage.
RAJALAKSHMI INSTITUTE OF TECHNOLOGY,
KUTHAMBAKKAM, CHENNAI - 600124
Department of Artificial Intelligence and Data Science
This graphic informs the fundamental approach of the chapter and can be used to illustrate the
intersection of information states (x-axis), key objectives of C.I.A. (y-axis), and the three primary
means to implement (policy, education, and technology).
5. COMPONENTS OF AN INFORMATION SYSTEM
• Information system (IS) is entire set of people, procedures, and technology that enable
business to use information.
– Software: The software component of an IS includes applications (programs),
operating systems, and assorted command utilities. Software is perhaps the most
difficult IS component to secure
– Hardware: Physical security policies deal with hardware as a physical asset and
with the protection of physical assets from harm or theft.
– Data: Data stored, processed, and transmitted by a computer system must be
protected. Data is often the most valuable asset of an organization and therefore
is the main target of inten- tional attacks.
RAJALAKSHMI INSTITUTE OF TECHNOLOGY,
KUTHAMBAKKAM, CHENNAI - 600124
Department of Artificial Intelligence and Data Science
1. Direct attack
When a Hacker uses his personal computer to break into a system. [Originate from the
threat itself]
2. Indirect attack
When a system is compromised and used to attack other system. [Originate from a
system or resource that itself has been attacked, and is malfunctioning or working under
the control of a threat].
RAJALAKSHMI INSTITUTE OF TECHNOLOGY,
KUTHAMBAKKAM, CHENNAI - 600124
Department of Artificial Intelligence and Data Science
Investigation
• What problem is the system being developed to solve?
• Objectives, constraints, and scope of project are specified
• Preliminary cost-benefit analysis is developed
• At the end of all phases, a process is undertaken to assess economic, technical, and
behavioral feasibilities and ensure implementation is worth time and effort
Analysis
• The analysis phase begins with the information learned during the investigation phase.
• This phase consists primarily of assessments of the organization, the status of current
systems, and the capability to support the proposed systems.
• Analysts begin to determine what the new system is expected to do and how it will
interact with existing systems.
• This phase ends with the documentation of the findings and a feasibility analysis update.
Logical Design
• First and driving factor is business need
o Applications are selected to provide needed services
• Data support and structures capable of providing the needed inputs are identified
• Specific technologies are delineated to implement the physical solution
• Analysts generate estimates of costs and benefits to allow comparison of available
options
RAJALAKSHMI INSTITUTE OF TECHNOLOGY,
KUTHAMBAKKAM, CHENNAI - 600124
Department of Artificial Intelligence and Data Science
• A national effort is under way to create a common body of knowledge focused on secure
software development
• U.S. Department of Defense and Department of Homeland Security supported the
Software Assurance Initiative which resulted in publication of Secure Software
Assurance (SwA) Common Body of Knowledge (CBK)
• SwA CBK serves as a strongly recommended guide to developing more secure
applications.
• SwA CBK is a work in progress, contains following sections:
– Nature of Dangers
– Fundamental Concepts and Principles
– Ethics, Law, and Governance
– Secure Software Requirements
– Secure Software Design
– Secure Software Construction
– Secure Software Verification, Validation, and Evaluation
– Secure Software Tools and Methods
– Secure Software Processes
– Secure Software Project Management
– Acquisition of Secure Software
– Secure Software Sustainment
Software Design Principles
Good software development results in secure products that meet all design specifications.
• Some commonplace security principles
– Keep design simple and small
– Access decisions by permission not exclusion
– Every access to every object checked for authority
– Design depends on possession of keys/passwords
– Protection mechanisms require two keys to unlock
– Programs/users utilize only necessary privileges
• Some commonplace security principles
– Minimize mechanisms common to multiple users
RAJALAKSHMI INSTITUTE OF TECHNOLOGY,
KUTHAMBAKKAM, CHENNAI - 600124
Department of Artificial Intelligence and Data Science
o The senior technology officer, although other titles such as Vice President of
Information, VP of Information Technology, and VP of Systems may be used.
o The CIO is primarily responsible for advising the Chief Executive Officer,
President, or company owner on the strategic planning that affects the
management of information in the organization.
• Chief Information Security Officer
o The individual primarily responsible for the assessment, management, and
implementation of securing the information in the organization.
o The CISO may also be referred to as the Manager for Security, the Security
Administrator, or a similar title.
Information Security Project Team
A number of individuals who are experienced in one or multiple requirements of both the
technical and nontechnical areas.
• The champion: A senior executive who promotes the project and ensures its support,
both financially and administratively, at the highest levels of the organization.
• The team leader: A project manager, who may be a departmental line manager or staff
unit manager, who understands project management, personnel management, and
information security technical requirements.
• Security policy developers: Individuals who understand the organizational culture,
policies, and requirements for developing and implementing successful policies.
• Risk assessment specialists: People who understand financial risk assessment
techniques, the value of organizational assets, and the security methods to be used.
• Security professionals: Dedicated, trained, and well-educated specialists in all aspects
of information security from both technical and nontechnical standpoints.
• Systems administrators: People with the primary responsibility for administering the
systems that house the information used by the organization.
• End users: Those whom the new system will most directly impact. Ideally, a selection of
users from various departments, levels, and degrees of technical knowledge assist the
team in focusing on the application of realistic controls applied in ways that do not
disrupt the essential business activities they seek to safeguard.
Data Responsibilities
RAJALAKSHMI INSTITUTE OF TECHNOLOGY,
KUTHAMBAKKAM, CHENNAI - 600124
Department of Artificial Intelligence and Data Science
• Data owners:
o Members of senior management who are responsible for the security and use of
a particular set of information. The data owners usually determine the level of
data classification (discussed later), as well as the changes to that classification
required by organizational change. The data owners work with subordinate
managers to oversee the day-to-day administration of the data.
• Data custodians:
o Working directly with data owners, data custodians are responsible for the
information and the systems that process, transmit, and store it. Depending on
the size of the organization, this may be a dedicated position, such as the CISO, or
it may be an additional responsibility of a systems administrator or other
technology manager. The duties of a data custodian often include overseeing data
storage and backups, implementing the specific procedures and policies laid out
in the security policies and plans, and reporting to the data owner.
• Data users:
o Everyone in the organization is responsible for the security of data, so data users
are included here as individuals with an information security role.
Communities of Interest
Each organization develops and maintains its own unique culture and values. Within that
corporate culture, there are communities of interest. These include:
• Information Security Management and Professionals
• Information Technology Management and Professionals
• Organizational Management and Professionals
Information Security: Is It an Art or a Science?
With the level of complexity in today’s information systems, the implementation of information
security has often been described as a combination of art and science.
The concept of the security artisan is based on the way individuals perceived systems
technologists since computers became commonplace.
Security as Art
• There are no hard and fast rules regulating the installation of various security
mechanisms.
RAJALAKSHMI INSTITUTE OF TECHNOLOGY,
KUTHAMBAKKAM, CHENNAI - 600124
Department of Artificial Intelligence and Data Science