Information Security_Ch01
Information Security_Ch01
Email: [email protected]
Mobile Phone: 0915651748
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Principles of Information Security
Sixth Edition
Chapter1 Introduction to
Information Security
Chapter2 The Need for Security
Chapter3 Legal, Ethical, and
Professional Issues in
Information Security
Chapter4 Planning for Security
Chapter5 Risk Management
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Principles of Information Security
Sixth Edition
Chapter8 Cryptography
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Principles of Information Security
Sixth Edition
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Principles of Information Security
Sixth Edition
Lab Exercises
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Principles of Information Security
Sixth Edition
Chapter1
Introduction to
Information
Security
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Learning Objectives
• Upon completion of this material, you
should be able to:
– Define information security
– Recount the history of computer security and
explain how it evolved into information security
– Define key terms and critical concepts of
information security
– Explain the role of security in the
systems development life cycle
– Describe the information security
roles of professionals within an
organization
Contents
• Introduction
• The History of Information Security
• What Is Security
• CNSS Security Model
• Components of an Information System
• Balancing Information Security and Access
• Approaches to Information Security Implementation
• Security in the Systems Development Life Cycle
• Security Professionals and the Organization
• Communities of Interest
• Information Security: Is It an Art or a Science?
Contents
• Introduction
• The History of Information Security
• What Is Security
• CNSS Security Model
• Components of an Information System
• Balancing Information Security and Access
• Approaches to Information Security Implementation
• Security in the Systems Development Life Cycle
• Security Professionals and the Organization
• Communities of Interest
• Information Security: Is It an Art or a Science?
Introduction
• “Enterprise information security is a critical business
capability that needs to be aligned with corporate
expectations and culture that provides the
leadership and insight to identify risks and
implement effective controls.”—Martin Fisher, IT
Security Manager, North side Hospital, Atlanta,
Georgia
– Many information security practitioners
recognize that aligning information security
needs with business objectives must be the top
priority.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Contents
• Introduction
• The History of Information Security
• What Is Security
• CNSS Security Model
• Components of an Information System
• Balancing Information Security and Access
• Approaches to Information Security Implementation
• Security in the Systems Development Life Cycle
• Security Professionals and the Organization
• Communities of Interest
• Information Security: Is It an Art or a Science?
The history of information security
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Figure 1-1 The Enigma (1 of 2)
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
The history of information security
• 1960s
• Advanced Research Projects Agency (ARPA)
began to examine the feasibility of redundant
networked communications.
• Larry Roberts developed the ARPANET from its
inception.
The history of information security
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Table 1-1 Key Dates in Information
Security (2 of 2)
Date Document
1979 Dennis Ritchie publishes “On the Security of UNIX” and “Protection of Data File
Contents,” which discussed secure user IDs, secure group IDs, and the problems
inherent in the systems.
1982 The US. Department of Defense Computer Security Evaluation Center publishes the first
version of the Trusted Computer Security (TCSEC) documents, which came to be known
as the Rainbow Series.
1982 Grampp and Morris write “The UNIX System: UNIX Operating System Security.” In this
report the authors examined four “important handles to computer security”: physical control
of primes and computer facilities, management commitment to security objectives,
education of employees, and administrative procedures aimed at increased security.
1984 Reeds and Weinberger publish “File Security and the UNIX System Crypt Command.”
Their premise was: “No technique can be secure against wiretapping or is equivalent on
the computer. Therefore no technique can be secure against the system administrator or
other privileged users... the naive user have no chance.”
1992 Researchers for the Internet Engineering Task force, working at the Naval Research
Laboratory, develop the Simple Internet Protocol Plus (SIPP) Security protocols,
creating what is now known as IPSEC security.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Figure 1-4 Illustration of computer network
vulnerabilities from RAND Report R-609
• MULTICS
• Early focus of computer security research centered on a
system called Multiplexed Information and Computing
Service (MULTICS).
• The first operating system to integrate security into its
core functions.
• It was mainframe, time-sharing operating system
developed in the mid-1960s by General Electric (GE),
Bell Labs, and Massachusetts Institute of Technology
(MIT).
• Several MULTICS key players created UNIX.
Primary purpose of UNIX was text processing.
The history of information security
• In 1988
- The Defense Advanced Research Projects
Agency (DARPA) within the Department of
Defense created the Computer Emergency
Response Team (CERT) to address network
security.
The history of information security
• 1990s?
Networks of computers became more common, as
did the need to connect them to each other.
Internet became the first global network of networks.
Initially, network connections were based on de facto
standards.
In early Internet deployments, security was treated as
a low priority.
In 1993, DEFCON conference was established for
those interested in information security.
The history of information security
• 2000 to Present?
The Internet brings millions of unsecured computer
networks into continuous communication with each
other.
The ability to secure a computer’s data was
influenced by the security of every computer to which
it is connected.
Growing threat of cyber attacks has increased the
awareness of need for improved security.
Nation-states engaging in information warfare
Contents
• Introduction
• The History of Information Security
• What Is Security
• CNSS Security Model
• Components of an Information System
• Balancing Information Security and Access
• Approaches to Information Security Implementation
• Security in the Systems Development Life Cycle
• Security Professionals and the Organization
• Communities of Interest
• Information Security: Is It an Art or a Science?
What Is Security? (1 of 2)
• “A state of being secure and free from danger
or harm; the actions taken to make someone or
something secure.”
• A successful organization should have
multiple layers of security in place to protect:
– Operations
– Physical infrastructure
– People
– Functions
– Communications
– Information
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
What Is Security? (2 of 2)
• The protection of information
and its critical elements,
including systems and
hardware that use, store, and
transmit that information
(Committee on National
Security Systems (CNSS)
• Includes information
security management,
data security, and
network security
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Factors of information security systems
• C.I.A.N
˗ Confidentiality
Confidentiality measures protect information from
unauthorized access and misuse.
Most information systems house information that has some
degree of sensitivity. It might be proprietary business
information that competitors could use to their advantage,
or personal information regarding an organization’s
employees, customers or clients.
Factors of information security systems
• C.I.A.N
– Integrity
Measures protect information from unauthorized
alteration.
These measures provide assurance in the accuracy
and completeness of data.
The need to protect information includes both data
that is stored on systems and data that is transmitted
between systems such as email.
Factors of information security systems
• C.I.A.N
– Authentication
Refers to the process of verifying the identity of a
user or entity.
It is crucial for ensuring that only authorized
individuals or systems gain access to resources,
data, or services.
Factors of information security systems
• C.I.A.N
– Non-repudiation
Prevent individuals or entities from denying their
involvement or actions in a transaction or
communication.
It provides evidence that can be used to prove the
authenticity and integrity of a message or transaction
and protects against disputes or fraudulent claims.
Key Information Security Concepts
• Access • Risk
• Asset • Subjects and objects
• Attack of attack
• Control, safeguard, or • Threat
countermeasure • Threat agent
• Exploit • Threat event
• Exposure • Threat source
• Loss • Vulnerability
• Protection profile or
security posture
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Key Information Security Concepts
• Access
- A subject or object’s ability to use, manipulate,
modify, or affect another subject or object.
- Authorized users have legal access to a
system, whereas hackers must gain illegal
access to a system. Access controls
regulate this ability
Key Information Security Concepts
• Asset
- The organizational resource that is being
protected.
- Logical asset
• Web site
• Software
• Data
- Physical asset
• A person
• Computer system
• Hardware..
Key Information Security Concepts
• Attack
- The act that can damage or otherwise
compromise information and the information
systems.
- Attacks can be
• Active or passive
• Intentional or unintentional
• Direct or indirect
Key Information Security Concepts
• Attack
- Attacks can be
• Active or passive
Active: DoS, Cryptojacking
Passive: release of message contents; traffic analysis
• Intentional or unintentional
Intentional: APT (Advanced Persistent Threat) attack
Unintentional: Human error, environmental hazards,
computer failures
• Direct or indirect
Direct
Indirect: botnet in DDoS attack
Key Information Security Concepts
• Attack
• A computer can be the subject of an attack and/or
the object of an attack.
– When it is the subject of an attack, the computer is
used as an active tool to conduct attack.
– When it is the object of an attack, the computer is the
entity being attacked.
Key Information Security Concepts
• Exploit
- A technique used to compromise a system.
- Verb
• Attackers may attempt to exploit a system or other
information asset by using it illegally for their
personal gain.
- Noun
• a documented process to take advantage of a
vulnerability, usually in software. Exploits make use
of existing software tools or custom-made software
components.
Key Information Security Concepts
• Exposure
- A condition or state of being exposed
- In information security, exposure exists when a
vulnerability is known to an attacker.
Key Information Security Concepts
• Loss
- A single instance of an information asset
suffering damage or destruction, unintended or
unauthorized modification or disclosure, or
denial of use.
- When an organization’s information is stolen, it
has suffered a loss.
Key Information Security Concepts
• Risk
- The probability of an unwanted occurrence,
such as an adverse event or loss.
- Organizations must minimize risk to match
their risk appetite—the quantity and nature of
risk they are willing to accept.
Key Information Security Concepts
• Threat
- Any event or circumstance that has the
potential to adversely affect operations and
assets.
• Threat agent
- The specific instance or a component of a
threat.
Key Information Security Concepts
• Threat event
- An occurrence of an event caused by a threat
agent.
• An example of a threat event might be damage
caused by a storm.
- This term is commonly used interchangeably
with the term attack.
Key Information Security Concepts
• Threat source
- A category of objects, people, or other entities
that represents the origin of danger to an asset
• Vulnerability
- A potential weakness in an asset or its
defensive control system(s).
• Flaw in a software package
Key Information Security Concepts
• Example
- You received an email with attach file from
stranger
Threat?
Vulnerability?
Risk?
Critical Characteristics of Information
• The value of information comes from the
characteristics it possesses:
Accuracy Integrity
Authenticity Personally identifiable
Availability information (PII)
Confidentiality Possession
Utility
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Critical Characteristics of Information
• Accuracy
- How data is free of errors and has the value
that the user expects.
Critical Characteristics of Information
• Authenticity
- How data is genuine or original rather than
reproduced or fabricated.
Critical Characteristics of Information
• Availability
- How data is accessible and correctly formatted
for use without interference or obstruction.
Critical Characteristics of Information
• Confidentiality
- How data is protected from disclosure or
exposure to unauthorized individuals or
systems.
•.
Critical Characteristics of Information
• Integrity
- How data is whole, complete, and uncorrupted.
https://www.virtualbox.org/wiki/Downloads
Critical Characteristics of Information
• Possession
- How the data’s ownership or control is
legitimate or authorized.
Critical Characteristics of Information
• Utility
- How data has value or usefulness for an end
purpose.
Contents
• Introduction
• The History of Information Security
• What Is Security
• CNSS Security Model
• Components of an Information System
• Balancing Information Security and Access
• Approaches to Information Security Implementation
• Security in the Systems Development Life Cycle
• Security Professionals and the Organization
• Communities of Interest
• Information Security: Is It an Art or a Science?
CNSS Security Model
• Introduction
• The History of Information Security
• What Is Security
• CNSS Security Model
• Components of an Information System
• Balancing Information Security and Access
• Approaches to Information Security Implementation
• Security in the Systems Development Life Cycle
• Security Professionals and the Organization
• Communities of Interest
• Information Security: Is It an Art or a Science?
Components of an Information System
• Information system (IS) is the entire set of people,
procedures, and technology that enable business to
use information.
– Software
– Hardware
– Data
– People
– Procedures
– Networks
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Components of an Information System
• Software
- Software includes system software and
application software.
- Software is perhaps the most difficult IS
component to secure.
- The exploitation of errors in software
programming accounts for a substantial portion
of the attacks on information
Components of an Information System
• Hardware
- The physical technology that houses and
executes the software, stores and transports
the data, and provides interfaces for the entry
and removal of information from the system.
• Data
- Data and information
• People
- IT officer and normal User
Components of an Information System
– Procedures
– Written instructions for accomplishing a
specific task.
– Most organizations distribute procedures
to employees
Password Policy, Email Usage Policy
Components of an Information System
– Networks
– Created much of the need for increased
computer and information security
– Security solutions for network
– Installing and configuring firewalls
– Implementing intrusion detection systems
Contents
• Introduction
• The History of Information Security
• What Is Security
• CNSS Security Model
• Components of an Information System
• Balancing Information Security and Access
• Approaches to Information Security Implementation
• Security in the Systems Development Life Cycle
• Security Professionals and the Organization
• Communities of Interest
• Information Security: Is It an Art or a Science?
Balancing Information Security and
Access
• Impossible to obtain perfect information
security—it is a process, not a goal.
• Security should be considered a balance
between protection and availability.
• To achieve balance, the level of security
must allow reasonable access, yet protect
against threats.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Contents
• Introduction
• The History of Information Security
• What Is Security
• CNSS Security Model
• Components of an Information System
• Balancing Information Security and Access
• Approaches to Information Security Implementation
• Security in the Systems Development Life Cycle
• Security Professionals and the Organization
• Communities of Interest
• Information Security: Is It an Art or a Science?
Approaches to Information Security
Implementation
• Bottom-up approach
- A method of establishing security policies
and/or practices that begins as a grassroots
effort in which systems administrators attempt
to improve the security of their systems.
• Top-down approach
- A methodology of establishing security policies
and/or practices that is initiated by upper
management.
- Systems development life cycle - SDLC
Figure 1-12 Approaches to information
security implementation
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Contents
• Introduction
• The History of Information Security
• What Is Security
• CNSS Security Model
• Components of an Information System
• Balancing Information Security and Access
• Approaches to Information Security Implementation
• Security in the Systems Development Life Cycle
• Security Professionals and the Organization
• Communities of Interest
• Information Security: Is It an Art or a Science?
Security in the Systems Development Life
Cycle
• Systems development life cycle (SDLC)
• A methodology for the design and
implementation of an information system
• Methodology
A formal approach to solving a problem based on a
structured sequence of procedures
• Using a methodology:
Ensures a rigorous process with a clearly defined goal
Increases probability of success
Figure 1-13 SDLC waterfall methodology
• Initiation
- Security at this point is looked at in terms of
business risks, with information security office
providing input.
The NIST Approach for Securing the SDLC
• Initiation
• Key security activities include:
– Delineation of business requirements in terms
of confidentiality, integrity, and availability
– Determination of information categorization and
identification of known special handling
requirements to transmit, store, or create
information
– Determination of any privacy requirements
Figure 1-14 Relating security
considerations in the Initiation
phase
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
The NIST Approach for Securing the SDLC
• Development/Acquisition
• Key security activities
– Conducting risk assessment and using results to
supplement baseline security controls
– Analyzing security requirements
– Performing functional and security testing
– Preparing initial documents for system certification
and accreditation
– Designing security architecture
Figure 1-15 Relating security considerations
in the Development/Acquisition phase
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
The NIST Approach for Securing the SDLC
• Implementation/Assessment
- System is installed and evaluated in
operational environment.
- Key security activities
– Integrating information system into its environment
– Planning and conducting system certification
activities in synchronization with testing of security
controls
– Completing system accreditation activities
Figure 1-16 Relating security
considerations in the
Implementation/Assessment phase
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
The NIST Approach for Securing the SDLC
• Maintenance
• Systems are in place and operating
• Enhancements and/or modifications to the
system are developed and tested
• Hardware and/or software are added or
replaced.
The NIST Approach for Securing the SDLC
• Maintenance
• Key security activities include:
• Conducting operational readiness review
• Managing configuration of system
• Instituting process and procedure for assured
operations and continuous monitoring of
information system’s security controls
• Performing reauthorization as required
Figure 1-17 Relating security
considerations in the
Operation/Maintenance phase
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
The NIST Approach for Securing the SDLC
• Disposal
• Provides for disposal of system and closeout
of any contracts in place
• Key security activities include
– Building and executing disposal/transition plan
– Archival of critical information
– Sanitization of media
– Disposal of hardware and software
Figure 1-18 Relating security
considerations in the Disposal phase
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Microsoft’s SDLC
• Training
– Core security training
• Requirements
– Establish security requirements
– Create quality gates/bug bars
– Perform security and privacy risk assessments
Microsoft’s SDLC
• Design
– Establish design requirements
– Perform attack surface analysts/ reduction
– Use threat modeling
• Implementation:
• Use approved tools
• Deprecate unsafe functions
• Perform static analysis
Microsoft’s SDLC
• Verification:
• Perform dynamic analysis
• Perform fuzz testing
• Conduct attack surface review
Microsoft’s SDLC
• Release:
– Create an incident response plan
– Conduct nal security review
– Certify release and archive
• Response:
– Execute incident response plan
Contents
• Introduction
• The History of Information Security
• What Is Security
• CNSS Security Model
• Components of an Information System
• Balancing Information Security and Access
• Approaches to Information Security Implementation
• Security in the Systems Development Life Cycle
• Security Professionals and the Organization
• Communities of Interest
• Information Security: Is It an Art or a Science?
Security Professionals and the
Organization
• Wide range of professionals are required
to support a diverse information security
program.
• Senior management is the key component.
• Additional administrative support and
technical expertise are required to
implement details of the IS program.
Security Professionals and the
Organization
• Senior Management
- Chief information officer (CIO)
• Senior technology officer
• Primarily responsible for advising the senior
executives on strategic planning
- Chief information security officer (CISO)
• Has primary responsibility for assessment,
management, and implementation of IS in the
organization
• Usually reports directly to the CIO
Security Professionals and the
Organization
• Information Security Project Team
- A small functional team of people who are
experienced in one or multiple facets of
required technical and nontechnical areas
• Champion
• Team leader
• Security policy developers
• Risk assessment specialists
• Security professionals
• Systems administrators
• End users
Security Professionals and the
Organization
• Data Responsibilities
- Data owners: senior management responsible
for the security and use of a particular set of
information
- Data custodians: responsible for the
information and systems that process,
transmit, and store it
- Data users: individuals with an information
security role
Contents
• Introduction
• The History of Information Security
• What Is Security
• CNSS Security Model
• Components of an Information System
• Balancing Information Security and Access
• Approaches to Information Security Implementation
• Security in the Systems Development Life Cycle
• Security Professionals and the Organization
• Communities of Interest
• Information Security: Is It an Art or a Science?
Communities of Interest
• Communities of Interest
- Group of individuals united by similar
interests/values within an organization
• Information security management and
professionals
• Information technology management and
professionals
• Organizational management and professionals
Contents
• Introduction
• The History of Information Security
• What Is Security
• CNSS Security Model
• Components of an Information System
• Balancing Information Security and Access
• Approaches to Information Security Implementation
• Security in the Systems Development Life Cycle
• Security Professionals and the Organization
• Communities of Interest
• Information Security: Is It an Art or a Science?
Information Security: Is It an Art or
a Science?
• Implementation of information security
is often described as a combination of
art and science.
• “Security artisan” idea: based on the way
individuals perceive system technologists
and their abilities.
Information Security: Is It an Art or
a Science?
• Security as Art
- No hard and fast rules nor many universally
accepted complete solutions
- No manual for implementing security through
entire system
Information Security: Is It an Art or
a Science?
• Security as Science
- Dealing with technology designed for rigorous
performance levels.
- Specific conditions cause virtually all actions in
computer systems.
- Almost every fault, security hole, and systems
malfunction is a result of interaction of specific
hardware and software.
- If developers had sufficient time, they could
resolve and eliminate faults.
Information Security: Is It an Art or
a Science?
• Security as a Social Science
- Social science examines the behavior of
individuals interacting with systems.
- Security begins and ends with the people that
interact with the system, intentionally or
otherwise.
- Security administrators can greatly reduce the
levels of risk caused by end users and create
more acceptable and supportable security
profiles.
Summary (1 of 2)
• Computer security began immediately after
the first mainframes were developed.
• Successful organizations have multiple
layers of security in place: physical,
personal, operations, communications,
network, and information.
• Security should be considered a balance
between protection and availability.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Summary (2 of 2)
• Information security must be managed
similar to any major system implemented in
an organization using a methodology like
the SDLC.
• Implementation of information security is
often described as a combination of art
and science.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Questions
1. What is security?
2. What is the critical elements need to be
protected in an organization?
3. What are the factors that need to be
ensured in an information security system?