UNIT 1
UNIT 1
UNIT 1
Data is raw, unorganized facts or values, like numbers or words.
Information is processed, organized, and meaningful data that you can use to make
decisions.
For example:
• Availability: Ensures data and systems are accessible to authorized users when
needed. Techniques include backup systems, redundancy, and DDoS protection.
Additional Characteristics of information Security:
1. Authenticity: Ensures that the information is genuine and comes from a trusted
source.
• Example: Using digital signatures to verify that a document was sent by the
right person.
2. Accountability: Ensures that every action or change in a system can be traced
back to a specific person or system.
• Example: A secure online transaction where both parties have proof of the
exchange.
https://helix-stamp-628.notion.site/UNIT-1-14939aa0e1ad80b19c01fefd4bf42f87 1/12
3/4/25, 10:39 AM UNIT 1
1. Encryption: Turning data into a code that only authorized people can read,
making it unreadable to anyone who doesn’t have the decryption key.
• Example: Encrypting emails so only the recipient can read the message.
2. Access Control: Setting permissions to restrict who can access certain data or
systems. It ensures that only authorized users can view or modify sensitive
information.
• Example: Using a password to lock your phone so only you can open it.
3. Firewalls: Software or hardware that monitors and controls incoming and
outgoing network traffic based on security rules. It helps block harmful traffic
and unauthorized access to a network.
The NSTISSC Security Model, also known as the McCumber Cube, is a framework
developed by the National Security Telecommunications and Information Systems
Security Committee (NSTISSC) to guide comprehensive information security. It
extends the CIA triad (Confidentiality, Integrity, Availability) by considering
additional dimensions of security.
The Model Has Three Dimensions:
https://helix-stamp-628.notion.site/UNIT-1-14939aa0e1ad80b19c01fefd4bf42f87 2/12
3/4/25, 10:39 AM UNIT 1
Evaluate how to secure each state of information for each security objective using
one or more security countermeasures.
This forms 27 intersections (3 objectives × 3 states × 3 countermeasures).
You evaluate each combination of these dimensions. For example:
https://helix-stamp-628.notion.site/UNIT-1-14939aa0e1ad80b19c01fefd4bf42f87 3/12
3/4/25, 10:39 AM UNIT 1
• Users who interact with the system, including IT staff and end-users.
https://helix-stamp-628.notion.site/UNIT-1-14939aa0e1ad80b19c01fefd4bf42f87 4/12
3/4/25, 10:39 AM UNIT 1
5. Network:
• Examples: Local Area Networks (LAN), Wide Area Networks (WAN), and the
Internet.
• Hardware runs the software, which processes data stored in the database.
• The network ensures seamless communication and access across all parts of the
system.
These components collectively form the backbone of any information system,
ensuring it functions efficiently and meets organizational needs.
Example: Online Shopping Platform (e.g., Amazon, Flipkart)
• The network connects the customer to the backend servers and processes
payments securely.
To ensure the safety and reliability of an information system, each component must
be protected with specific security measures.
1. Hardware Security
Protects physical devices from theft, damage, or unauthorized access.
Measures:
• Physical Security: Lock servers in secure rooms and use surveillance cameras.
https://helix-stamp-628.notion.site/UNIT-1-14939aa0e1ad80b19c01fefd4bf42f87 5/12
3/4/25, 10:39 AM UNIT 1
Ensures that applications and systems are protected from vulnerabilities and
malicious activities.
Measures:
• Access Policies: Ensure only authorized personnel can access sensitive systems.
https://helix-stamp-628.notion.site/UNIT-1-14939aa0e1ad80b19c01fefd4bf42f87 6/12
3/4/25, 10:39 AM UNIT 1
Balancing security and access means protecting sensitive data or systems while
making it easy for the right people to use them. Too much security makes it hard for
users, and too little security makes the system vulnerable to hackers.
Example:
In this example, an online shopping website requires users to create a 128-character
password for account security. While this is highly secure, it makes it very difficult
for users to remember, leading to accessibility issues such as forgotten passwords
and frustration.
Problems:
• Poor User Experience: Users may abandon the site due to difficulty accessing
their accounts.
Solution (Balancing Security and Access):
• Shorter Passwords: Use passwords that are strong (e.g., 8 characters) but easier
to remember.
• Password Recovery: Offer easy ways to reset passwords via email or SMS.
• Account Lockout: Temporarily lock accounts after several failed attempts but
allow recovery.
https://helix-stamp-628.notion.site/UNIT-1-14939aa0e1ad80b19c01fefd4bf42f87 7/12
3/4/25, 10:39 AM UNIT 1
Security should be built into every stage of software development, not added later.
Fixing security issues early is cheaper and more efficient than dealing with them
after deployment.
Each phase of development has different security tasks, but everyone on the team
must stay mindful of security throughout the process. By doing this, teams can
reduce risks, prevent vulnerabilities, and create safer software.
The SDLC is the process of building software, and security should be a top priority at
every step. Let’s break it down using the example of building a membership renewal
portal:
Phase 1: Requirements
This is where you figure out what the software needs to do. Think about what the
user wants and how to keep it safe.
• Example:
◦ User need: Members should be able to check their contact info before
renewing.
◦ Security need: Members should only see their own info, not anyone else’s.
Phase 2: Design
Here, you plan how the software will work. Think about what it should do and what
it should NOT do to stay secure.
• Example:
◦ Design: The system will pull the user’s name, email, and address from the
database and show it on the screen.
◦ Security: Before showing anything, the system must check if the user is
logged in. If not, send them to the login page.
Phase 3: Development
https://helix-stamp-628.notion.site/UNIT-1-14939aa0e1ad80b19c01fefd4bf42f87 8/12
3/4/25, 10:39 AM UNIT 1
This is where you write the code. Follow secure coding rules to avoid mistakes that
hackers could exploit.
Phase 4: Verification
Before releasing the software, test it thoroughly to make sure it works and is secure.
Use automated tools to help with this.
• Examples of testing:
Phase 5: Maintenance
Even after the app is live, you need to keep it secure. Bugs or vulnerabilities might
show up later, so you’ll need to fix them.
• Examples:
In today's digital world, businesses face numerous security threats that can disrupt
operations, harm their reputation, and lead to significant financial losses. To ensure
the protection of sensitive data, maintain customer trust, and comply with regulatory
requirements, security is a critical component for businesses. Below are key reasons
why businesses need security:
1. Protecting Sensitive Data
https://helix-stamp-628.notion.site/UNIT-1-14939aa0e1ad80b19c01fefd4bf42f87 9/12
3/4/25, 10:39 AM UNIT 1
• Business Needs:
• Business Needs:
• Business Needs:
◦ Example: A bank needs strong security to protect against online fraud and
ensure that customers’ transactions and account details are secure.
4. Maintaining Customer Trust
• Business Needs:
• Business Needs:
https://helix-stamp-628.notion.site/UNIT-1-14939aa0e1ad80b19c01fefd4bf42f87 10/12
3/4/25, 10:39 AM UNIT 1
• Business Needs:
◦ Example: A software company needs to protect its source code from being
stolen or copied by competitors.
Security is no longer optional for businesses; it is essential for protecting valuable
assets, maintaining customer trust, ensuring compliance with regulations, and
enabling smooth operations. Investing in strong security systems and protocols
minimizes risk, enhances business continuity, and ensures long-term success in an
increasingly digital world.
Threats
A threat is anything that has the potential to harm an organization's systems, data,
or operations. Threats can be intentional (like hacking) or unintentional (like a
natural disaster).
• Example: An email from a "bank" asks you to click a link and enter your
personal details.
3. Denial of Service (DoS) Attack: Overloading a server or network with traffic to
make it unavailable to legitimate users.
https://helix-stamp-628.notion.site/UNIT-1-14939aa0e1ad80b19c01fefd4bf42f87 11/12
3/4/25, 10:39 AM UNIT 1
• Example: An attacker calls posing as tech support and asks for your login
credentials.
5. SQL Injection: An attack that exploits vulnerabilities in a web application's
database layer by injecting malicious SQL code to gain unauthorized access to a
database.
Attacks
An attack is an intentional action taken to exploit vulnerabilities in a system to cause
harm. It is how a threat materializes into an actual event.
https://helix-stamp-628.notion.site/UNIT-1-14939aa0e1ad80b19c01fefd4bf42f87 12/12