Introduction To Information Security
Introduction To Information Security
Introduction to Information
Security
• Avoidance
• Deterrence
• Detection
• Correction
Risk Analysis
Encryption: plaintext to
ciphertext
Decryption: From ciphertext to
plaintext
Key Management
• Public vs. Private
• Selecting Key
• Management of the Keys
• Protection of Keys
• Testing of Keys
• Updating Keys
• Error Detection
Risk Management
Should Include:
-People
-Procedures
-Data/Information
-Software
-Hardware
Threat and Exposure Assessment
• Density/Volume of Information
• Accessibility of Systems
• Complexity
• Electronic Vulnerability
• Media Vulnerability
• Human Factors
Safeguards and Counter
Measures
• Prevent Exposures
• Detect Attempted Threats
• Correct the Causes of Threats
Business Continuity Planning (1)
• Planning and Analysis Methods
• Rates of Occurrence of Disabling Events
• Availability and Use of Planning Tools/Aids
• Identification of Business Success
factors(BSF) and Critical
capabilities(Critical or Key Success Factors
(CSF/KSF)
Business Continuity Planning (2)
• Alternative Sources of Supply
• Legal and Regulatory Requirements
Backups and Procedures
• Importance for Recovery
• Data Value
• Manuals and Documentation
• Back Up Frequency
• On-Line Systems
• Equipment
The Three C’s
-Catastrophe
-Contingency
-Continuation
BE PREPARED!!!
Off-site Backups and Storage
Two Control Points:
Professionals Should
• Understand:
Computer Organizations, Architectures,
Designs
• Source and Origin of Security
Requirements
• Advantages/Disadvantages of Various
Architectures
• Security Features/Functions of Various
Components
• Choices to be Considered When Selecting
Common Flaws and Penetration
Methods
• Operating Systems Flaws
• Penetration Techniques(Trojan Horses,
Virus, Salami Attack, Deception)
Viruses
• Design
• Protection
• Recovery
• Prevention
• Counter Measures
Telecommunications Security
• Objectives
• hazards and Exposures
• Effects of Topology, Media, Protocols,
Switching
• Hazards and Classes of Attack
• Defenses and Protective Measures
Methods
• Aborted Connection
• Active Wiretapping
• Between - The - Lines Entry
• Call Back
• Emanations
• Covert Channel
• Cross-Talk
• Eavesdropping
• Electronic Funds Transfer(EFT)
• Handshaking
Considerations
• Transmission Technologies
• Bandwidth
• Connectivity Potential
• Geographical Scope
• Noise Immunity
• Security
• Applications
• Relative Cost
System Security Officer
• Organizational Knowledge (Structural and
Behavioral)
• Technical Knowledge
• Accounting/Audit Concepts
• Personnel Administration Matters
• Laws/Legislation
• Strategic/Tactical Planning
• Labor/Negotiation/Strategies/Tactics
Computer Security Incidence
Response
• Goals
• Constituency
• Structure
• Management Support/Funding
• Charter
• Handbook of Operations
• Staffing
Legal/Regulatory
• Federal Laws/Regulations
• State Laws/Regulations
• International Issues
• Organizational/Agency Considerations
• Personal Behavior
• Remedies to Constituents
• Civil vs. Criminal Law
• Pending Legislation
Computer Crime
• Fraud
• Embezzlement
• Unauthorized Access
• “White Collar” Crime
• Theft of Hardware/Copying Software
• Physical Abuse
• Misuse of Information
• Privacy/Confidentiality Violations
• Intellectual Property
• Negligence
• License Agreements
Investigation
• Legal Requirements for Maintaining a Trail
of Evidence
• Interrogation Techniques
• Legal Limits on Interrogation Methods
Permitted
Application Program Security
• Distribution of Controls Between
Application and System
• Controls Specific to Key, Common, or
Industry Applications
• Criteria for Selection and Application
• Tests for Adequacy
• Standards for Good Practice
Software Controls
• Development
• Maintenance
• Assurance
• Specification and Verification
• Database Security Controls
• Accounting/Auditing
Physical Security
• Site/Building Location
• External characteristics/Appearance
• Location of Computer Centers
• Construction Standards
• Electrical Power(UPS)
• Water/Fire Considerations
• Traffic/Access Control
• Air Conditioning/Exhaust
• Entrances/Exits
• Furnishings
• Storage of Media/Supplies
Operations Security
• Resources to be Protected
• Privileges to be Restricted
• Available Control Mechanisms
• Potential for Abuse of Access
• Appropriateness of Controls
• Acceptable Norms of Good Practice
Information Ethics
Doing the Right Thing!!
• Privacy/Confidentiality
• Common Good
• Professional Societies
• Professional Certifications
Policy Development
Considerations:
• Have Longevity
• Be Jargon Free
• Be Independent of Jobs, Titles, or Positions
• Set Objectives
• Fix Responsibility
• Provide Resources
• Allocate Staff
• Be Implemented Using Standards and
Guidelines
That’s All Folks
(and not a minute too soon!!)