Lesson One
Lesson One
Introduction
Principles of • Information security: a “well-informed sense of assurance that
Information Security, the information risks and controls are in balance.” — Jim
Anderson, Inovant (2002)
• Security professionals must review the origins of this field to
Fourth Edition understand its impact on our understanding of information
Principles of Information
Security, Fourth Edition
security today
Chapter 1
Introduction to Information Security
Principles of Information
• Multiple levels of security were implemented • Larry Roberts developed ARPANET from its inception
• Physical controls • Plan
• Rudimentary • Link computers
• Resource sharing
• Defending against physical theft, espionage, and
• Link 17 Computer Research Centers
sabotage
• Cost 3.4M
3 • ARPANET is predecessor to the Internet 4
Principles of Information
Security, Fourth Edition
5 6
1
23-Jan-24
Principles of Information
Security, Fourth Edition
Principles of Information
Security, Fourth Edition
• Initially based on de facto standards
• GE, Bell Labs, and MIX • In early Internet deployments, security was treated as a low
• Several MULTICS key players created UNIX priority
• Late 1970s
• Microprocessor expanded computing capabilities
• Mainframe presence reduced
• Expanded security threats
7 8
Principles of Information
• Growing threat of cyber attacks has increased the need for
improved security
9 10
Principles of Information
Security, Fourth Edition
2
23-Jan-24
Principles of Information
Security, Fourth Edition
Countermeasure • Threat
• Exploit • Threat Agent
• Exposure • Vulnerability
• Loss
Critical Characteristics of
CNSS Security Model
Information
• The value of information comes from the characteristics it
possesses:
• Availability
• Accuracy
• Authenticity
Principles of Information
Security, Fourth Edition
Principles of Information
Security, Fourth Edition
• Confidentiality
• Integrity
• Utility
• Possession
3
23-Jan-24
Principles of Information
Security, Fourth Edition
Principles of Information
Security, Fourth Edition
• Hardware
• Data • Must allow reasonable access, yet protect
• People against threats
• Procedures
• Networks
19 20
Approaches to Information
Figure 1-6 – Balancing Security
Security Implementation:
and Access
Bottom-Up Approach
• Grassroots effort -systems administrators drive
• Key advantage: technical expertise of individual
administrators
Approaches to Information
Security Implementation: Top-
Down Approach
• Initiated by upper management
• Issue policy, procedures, and processes
• Dictate goals and expected outcomes of project
Principles of Information
Security, Fourth Edition
4
23-Jan-24
Principles of Information
Security, Fourth Edition
• Formal approach to problem solving
• Based on structured sequence of procedures
• Using a methodology:
• Ensures a rigorous process
• Increases probability of success
• Traditional SDLC consists of six general phases 25 Figure 1-10 SDLC Waterfall Methodology 26
Investigation Analysis
• What problem is the system being developed to • Consists of assessments of:
solve? • The organization
• Objectives, constraints, and scope of project • Current systems
specified • Capability to support proposed systems
Security, Fourth Edition
Principles of Information
• Determine what new system is expected to do
• Preliminary cost-benefit analysis developed
• Determine how it will interact with existing systems
• At end
• Ends with documentation
• Feasibility analysis performed
• Assess economic, technical, and behavioural
feasibilities
27 28
Principles of Information
Security, Fourth Edition
29 30
5
23-Jan-24
Principles of Information
Security, Fourth Edition
Principles of Information
Security, Fourth Edition
• Users presented with system for performance review • Process begins again from the investigation phase
and acceptance test • When current system can no longer support the
organization’s mission, a new project is implemented
31 32
Principles of Information
them
• SecSDLC is a coherent program not series of random,
seemingly unconnected actions
33 34
Principles of Information
Security, Fourth Edition
• Analysis of relevant legal issues that could impact design • Disaster recovery
of the security solution • Feasibility analysis to determine whether project should
• Risk management task begins be continued or outsourced
35 36
6
23-Jan-24
Principles of Information
Security, Fourth Edition
Principles of Information
Security, Fourth Edition
organization for project • Entire tested package is presented to management for
final approval
37 38
Principles of Information
• Information security profile of an organization requires are required to implement details of IS program
constant adaptation as new threats emerge and old
threats evolve
39 40
Principles of Information
Security, Fourth Edition
7
23-Jan-24
Principles of Information
Security, Fourth Edition
Principles of Information
Security, Fourth Edition
• Data users: end users who work with information to professionals
perform their daily jobs supporting the mission of the • Organizational management and professionals
organization
43 44
Information Security: Is it an
Security as Art
Art or a Science?
• Implementation of information security often described • No hard and fast rules nor many universally accepted
as combination of art and science complete solutions
• “Security artisan” idea: based on the way individuals • No manual for implementing security through entire
perceive systems technologists since computers became system
Security, Fourth Edition
Principles of Information
commonplace
45 46
Principles of Information
Security, Fourth Edition
• Nearly every fault, security hole, and systems • Security administrators can greatly reduce levels of risk
malfunction are a result of interaction of specific caused by end users, and create more acceptable and
hardware and software supportable security profiles
• If developers had sufficient time, they could resolve and
eliminate faults
47 48