Top Banner
Information Security What is Information Security?
27
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Information Security What is Information Security?

Information Security

What is Information Security?

Page 2: Information Security What is Information Security?

Information Security

Information SecurityInformation Security is the name given to the preventative stepspreventative steps we take to guard our informationinformation and our capabilitiescapabilities.

Measures adopted to prevent the unauthorized use, misuse, modification, or denial of use of knowledge, facts ,data or capabilities.

Page 3: Information Security What is Information Security?

Critical Characteristics of Information

AvailabilityAccuracyAuthenticityConfidentialityIntegrity

Page 4: Information Security What is Information Security?

Availability

Enables users who need to accessaccess information to do so without interference interference and receive it in requiredrequired format.format.

The information is availableavailable only to the authorizedauthorized users.

Page 5: Information Security What is Information Security?

Accuracy

Information is accurate when it is free free from mistakesfrom mistakes or errors and it has the value that the end user expects.

Page 6: Information Security What is Information Security?

Authenticity

Authenticity of information is the quality or state of being genuine or original,genuine or original, rather than a reproduction or fabrication.

e.g. Email SpoofingEmail Spoofing The unauthorized use of a third-party The unauthorized use of a third-party

domain name as the sender's name in an e-domain name as the sender's name in an e-mail messagemail message

http://blockstatus.com/anonymous-mailer

Page 7: Information Security What is Information Security?

Confidentiality

Information is available only to people with rightful access.rightful access.

Ensuring that only those with the rights rights and privilegesprivileges to accessaccess a particular set of information are able to do so.

It is closely related with the privacyprivacy of information.

Page 8: Information Security What is Information Security?

Integrity

Information can only be changedchanged by authorizedauthorized personnel.

The quality or state of being whole, complete whole, complete and uncorrupted uncorrupted is the integrity of information.

Integrity check can be done through: File size File hashing

Hashing is the transformation of a string of character s into a usually shorter fixed-length value or key that represents the original string

Page 9: Information Security What is Information Security?

Components of an Information System

SoftwareHardwareDataPeopleProcedures

Page 10: Information Security What is Information Security?

Software

Comprises of OSOS,,ApplicationsApplications and command command utilitiesutilities.

BugsBugs,WeaknessesWeaknesses and HolesHoles. An error or defect in software or hardware that causes a program to

malfunction Security Hole( something you need to fix now) Security Warning( something you need to fix soon) Security Note (something you need to fix when you get around to it, or just

some information that you should consider)

Service PacksService Packs,PatchesPatches and Hot fixesHot fixes. Security is least Priorityleast Priority in Software

development

Page 11: Information Security What is Information Security?

Hardware

HousesHouses and ExecutesExecutes a software.Stores and carries the data.Provides InterfacesInterfaces for the entry and

removal of information from the system.Physical security policies Physical security policies deal with the deal with the

H/WH/W.

Page 12: Information Security What is Information Security?

Data

MainMain object of intentionalintentional attacks

Page 13: Information Security What is Information Security?

People

Main threatMain threat to information security.

Often OverlookedOverlooked

Page 14: Information Security What is Information Security?

Procedures

Procedures are written instructionswritten instructions for accomplishingaccomplishing a specific tasktask.

Another frequently overlookedoverlooked component

Page 15: Information Security What is Information Security?

What is Network Security?

Effort to create a secure computingsecure computing platformplatform, so users or programs cannot perform actionscannot perform actions that they are not allowed to do.

Network Security is the protectionprotection of networking componentsnetworking components, connectionsconnections and contentscontents.

Page 16: Information Security What is Information Security?

Network Security as a Continuous Process

Network security is a continuous processcontinuous process built around a security policy.Step 1: SecureStep 2: MonitorStep 3: TestStep 4: Improve

Page 17: Information Security What is Information Security?

Step 1: Secure the Network

Implement security solutions to preventprevent unauthorized accessunauthorized access and to protectprotect information.information.AuthenticationEncryptionFirewallsVulnerability Patching

Page 18: Information Security What is Information Security?

Step 2: Monitor Security

Detects violationsDetects violations to the security policy

Involves system auditingsystem auditing and real-time intrusion intrusion detectiondetection

ValidatesValidates the securitysecurity implementation in Step 1

Page 19: Information Security What is Information Security?

Step 3: Test Security

Validates effectivenessValidates effectiveness of the security policy through system auditing and network scanningnetwork scanning

Page 20: Information Security What is Information Security?

Step 4: Improve Security

Use information from the monitor and test phases to make improvements improvements to the security implementation.

Adjust the security policy as security holessecurity holes and risksrisks are identified.

Page 21: Information Security What is Information Security?

Terms related to Security

Assets Threats Attack Vulnerability Risk Analysis Countermeasures Hacking

Page 22: Information Security What is Information Security?

Asset

An asset is the organizational resourceorganizational resource that is being protected.

It can be logicallogical like website, information, data.

It can be physicalphysical like computer system or other tangible object.

Page 23: Information Security What is Information Security?

Threats, Vulnerability and Controls

Threat a person, thing, event or idea which poses some danger to an asset

(in terms of confidentiality, integrity, availability). a possible means by which a security policy may be breached.

An attack is a realisation of a threat.

Vulnerability A weakness in the system that can be exploited to cause loss or

harm Control, Countermeasure, safeguard

An action, device, procedure or technique that removes or reduces a vulnerability.

Page 24: Information Security What is Information Security?

Risk = Threat + Vulnerability

Threats without vulnerabilities pose no risk.Likewise, vulnerabilities without threats

pose no risk. Risk is the probability that something can

happen.Risk analysis can be quantitative or

qualitative.

Page 25: Information Security What is Information Security?

Cont…

Risk can be qualitatively defined in three levels: LowLow- Action to remove the vulnerability

should be taken if possible MediumMedium- Action to remove the vulnerability

is advisable HighHigh-- Action should be taken immediately to

remove this vulnerability

Page 26: Information Security What is Information Security?

Hacking

Can be defined positively and negatively:To write computer programs for enjoyment.To gain access to a computer illegally.

Page 27: Information Security What is Information Security?

Summary

What is Information Security?What is Network Security?Assets, Threats and Countermeasures