Chapter 2 Fundamentals of IS Security
Chapter 2 Fundamentals of IS Security
Fundamentals of
Information Systems Security
Objectives
○ Defense in Depth
○ Minimization
○ Compartmentalization.
○ Fail Securely
○ Cost-Benefit Analysis
○ Secure the weakest link
10/10/2023 Chapter 2 Fundamentals of Information Systems Security 5
Least Privilege
● The principle of least privilege stipulates, “Do not give any more
privileges than absolutely necessary to do the required job”.
● The principle of least privilege is a preventive control, because it
reduces the number of privileges that may be potentially abused
and therefore limits the potential damage.
● Examples
○ Giving users read only access to shared files if that’s what they
need, and making sure write access is disabled
○ Not allowing help desk staff to create or delete user accounts if all
that they may have to do is to reset a password
○ Not allowing software developers to move software from
development servers to production servers
10/10/2023 Chapter 2 Fundamentals of Information Systems Security 6
Defense in depth
● The principle of defense in depth is about having more than one layer or
type of defense. The reasoning behind this principle is that any one layer
or type of defense may be breached, no matter how strong and reliable
you think it is.
● But two or more layers are much more difficult to breach.
● Defense in depth works best when you combine two or more different
types of defense mechanisms—such as using a firewall between the
Internet and your LAN, plus the IP Security Architecture (IPSEC) to encrypt
all sensitive traffic on the LAN.
● In this scenario, even if your firewall is compromised, the attackers still
have to break IP Security to get to your data flowing across the LAN.
10/10/2023 Chapter 2 Fundamentals of Information Systems Security 7
Minimization
Deterrent Signs, Security policies Warning messages Visible guards and Dynamic
barbed wire cameras pop-up
warnings
Corrective HR penalties Redundancy
Recovery Backups, data replication Disaster recovery plans
● The discretionary access control model is the most widely used of the
three models.
● Controls access based on the identity of the requestor and on
access rules (authorizations) stating what requestors are (or are not)
allowed to do.
● In the DAC model, the owner (creator) of information (file or directory)
has the discretion to decide about and set access control restrictions
on the object in question.
● The ability to share resources in a peer-to-peer configuration allows
users to control and possibly provide access to information or resources
at their disposal.
10/10/2023 Chapter 2 Fundamentals of Information Systems Security 24
Mandatory Access Control
● Mandatory access control, as its name suggests, takes a stricter approach to
access control.
● Controls access based on comparing security labels (which indicate how
sensitive or critical system resources are- classification levels) with security
clearance levels (which indicate which system entities are eligible to access
certain resources)
● Users have little or no discretion as to what access permissions they can
set on their information.
● MAC-based systems use data classification levels (such as public, confidential,
secret, and top secret) and security clearance levels corresponding to data
classification levels to decide what access control restrictions to enforce
● This Model works in accordance with the system wide security policy set
by the system administrator.
● Data has a classification Level and Users have a Clearance Level.
10/10/2023 Chapter 2 Fundamentals of Information Systems Security 25
Role-Based Access Control (RBAC)
● Controls access based on the roles that users have within the system and on
rules stating what accesses are allowed to users in a given role.
● In the role-based access control model, rights and permissions are assigned to
roles instead of individual users.
● Rule Based Access Control, also with the acronym RBAC or RB-
RBAC.
● Rule Based Access Control will dynamically assign roles to users
based on criteria defined by the custodian or system administrator.
● For example, if someone is only allowed access to files during
certain hours of the day, Rule Based Access Control would be the
tool of choice.
● The additional “rules” of Rule Based Access Control requiring
implementation may need to be “programmed” into the network
by the custodian or system administrator in the form of code
versus “checking the box.”
Be Easy to understand (By all people who will have to read the policy)
Be Applicable (Don’t copy others’ policy word by word since it may not be applicable to you)
Be Do-able (The restrictions should not stop work!)
Be Enforceable (If it cannot be enforced, it will probably remain on paper)
Be Phased in (Organizations need time to digest policy)
Be Proactive (Say “what is allowed” rather than “what is not allowed”)
○ Organizations think:
■ Anything that is not permitted is prohibited
○ User think:
■ Anything that is not prohibited is permitted
Standards must be
Reasonable
Flexible
Current
Practical
Applicable
Reviewed regularly
The Defined Policies, Standards and Procedures will not serve the
purpose if not communicated to the people (an important component in
IS)
Generally, a Security Education, Training, and Awareness (SETA) program
is desirable in an organization. SETA program includes:
Security Education is a long-term insight as to why security is
important.
Security Training is a midrange plan to transfer knowledge and skill of
how security can be achieved.
Security Awareness is a short-term exposure to what security
information is available.
10/10/2023 Chapter 2 Fundamentals of Information Systems Security 47
Benefits of performing a SETA program
This is the
Security
Hierarchy
● In this phase,
○ systems are in place and operating,
○ enhancements and/or modifications to the system are developed
and tested
○ hardware and/or software is added or replaced.
○ The system is monitored for continued performance in accordance
with security requirements and needed system modifications are
incorporated.
○ The operational system is periodically assessed to determine how
the system can be made more effective, secure, and efficient-
remember IS security is a process- not an Absolute Result/Product
10/10/2023 Chapter 2 Fundamentals of Information Systems Security 64
Operations/Maintenance…
7 -Risk management in this context refers to risk associated with the development and not computer
security or system technical risk.