Week 1 - Introduction To Information Security
Week 1 - Introduction To Information Security
Chapter 1
Introduction to Information
Security
Slide 2
LEARNING OBJECTIVES:
Upon completion of this chapter you should be able to:
• Understand what information security is and how it came to
mean what it does today.
• Comprehend the history of computer security and how it
evolved into information security.
• Understand the key terms and critical concepts of
information security as presented in the chapter.
• Outline the phases of the security systems development life
cycle.
• Understand the role professionals involved in information
security in an organizational structure.
Slide 3
THE 1960S
• Department of Defense’s Advanced Research Project Agency
(ARPA) began examining the feasibility of a redundant networked
communications
THE 1990S
• Networks of computers became more common, so too did the need
to interconnect the networks
THE PRESENT
WHAT IS SECURITY?
• “The quality or state of being secure--to be free
from danger”
• To be protected from opponent
• A successful organization should have multiple
layers of security in place:
• Physical security
• Personal security
• Operations security
• Communications security
• Network security
Slide 13
• When a computer is
• the subject of an attack, it is used as an active tool to
conduct the attack
• the object of an attack, it is the entity being attacked
Slide 18
BOTTOM UP APPROACH
• Security from a grass-roots effort - systems
administrators attempt to improve the security of
their systems
TOP-DOWN APPROACH
• Initiated by upper management:
• issue policy, procedures, and processes
• dictate the goals and expected outcomes of the project
• determine who is accountable for each of the required actions
• Using a methodology
• ensures a rigorous process
• avoids missing steps
INVESTIGATION
• What is the problem with the system being
developed and need to solve?
ANALYSIS
• Consists primarily of
• assessments of the organization
• the status of current systems
• capability to support the proposed systems
LOGICAL DESIGN
• Based on business need, applications are selected
capable of providing needed services
•
• Based on applications needed, data support and structures
capable of providing the needed inputs are identified
PHYSICAL DESIGN
• Specific technologies are selected to support the alternatives identified and
evaluated in the logical design
IMPLEMENTATION
• Components are ordered, received, assembled, and tested
• The life cycle continues until the process begins again from the
investigation phase
• When the current system can no longer support the mission of the
organization, a new project is implemented
Slide 33
INVESTIGATION
• Identifies process, outcomes and goals of the project, and constraints
ANALYSIS
• Analysis of existing security policies or programs, along with documented
current threats and associated controls
• Includes an analysis of relevant legal issues that could impact the design
of the security solution
IMPLEMENTATION
• The security solutions are acquired (made or bought), tested, and
implemented, and tested again
• As new threats emerge and old threats evolve, the information security
profile of an organization requires constant adaptation
Slide 39
SENIOR MANAGEMENT
• Chief Information Officer
• the senior technology officer
• primarily responsible for advising the senior executive(s) for
strategic planning
DATA OWNERSHIP
• Data Owner - responsible for the security and use of a
particular set of information
• Data Users - the end systems users who work with the
information to perform their daily jobs supporting the mission
of the organization
Slide 43
COMMUNITIES OF INTEREST
• Each organization develops and maintains its own
unique culture and values. Within that corporate
culture, there are communities of interest:
INFORMATION SECURITY: IS IT AN
ART OR A SCIENCE?
• With the level of complexity in today’s information systems, the
implementation of information security has often been described as a
combination of art and science
Slide 45
SECURITY AS ART
• No hard and fast rules nor are there many universally accepted complete
solutions
SECURITY AS SCIENCE
• Dealing with technology designed to perform at high levels of
performance
• If the developers had sufficient time, they could resolve and eliminate
these faults
Slide 47
• Security begins and ends with the people that interact with the
system