SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Downloaden Sie, um offline zu lesen
INFORMATION
SECURITY
Unit I
History, What is Information Security?, Critical Characteristics of Information, Components of an
Information System, Securing the Components, Balancing Security and Access,
WHAT IS..
Information Risk
Threat
Opportunity
Information security
HISTORY
Please refer to the
document
“Malware_History”
added in Team’s Files
• 1960s: Organizations start to protect their computers
• 1970s:The first hacker attacks begin
• 1980s: Governments become proactive in the fight against
cybercrime
• 1990s: Organized crime gets involved in hacking
• 2000s: Cybercrime becomes treated like a crime
• 2010s: Information security becomes serious
VARIOUS
ASPECTS OF
SECURITY
Physical Security - to protect the physical items, objects, or
areas of an organization from unauthorized access and misuse.
Personal Security – to protect the individual or group of
individuals who are authorized to access the organization and
its operations.
Operations Security – to protect the details of a particular
operation or series of activities.
Communications Security – to protect an organization’s
communications media, technology, and content.
Network Security – to protect networking components,
connections, and contents.
Information Security – to protect information assets
A
C
I
CIA Triad:
1. Confidentiality
ensures information is inaccessible
to unauthorized people
2. Integrity
ensures the data is accurate and
trustworthy by preventing
unauthorized modification
3. Availability
ensures authorized people can
access the information when needed
Fundamental principles of Information Security
CRITICAL
CHARACTERISTICS
OF INFORMATION
• The value of information comes from the characteristics it
possesses:
• Availability – available to authorized user on demand
• Accuracy – error free to expected standards
• Authenticity – original & genuine, not fabrication
• Confidentiality – undisclosed to unauthorized people
• Integrity – whole, complete, and uncorrupted
• Utility – serves the purpose & available in meaningful form
• Possession - Information is said to be in possession if one
obtains it, independent of format or other characteristic.
While a breach of confidentiality always results in a breach of possession,a breach of
possession does not always result in a breach of confidentiality.
COMPONENTS OF
INFORMATION
SYSTEM
• Information System (IS) is entire set of software,
hardware, data, people and networks necessary to
use information as a resource in the organization
• Software
• Exploitation substantial portion of attacks on
information
• Hardware
• Physical security policies
• Securing physical location important
• Data
• Often most valuable asset
• Main target of intentional attacks
• People
• Weakest link
• Must be well trained and informed
• Networks
• Locks and keys won’t work
COMPONENTS OF
INFORMATION
SECURITY
• Management of Information Security primarily focuses on the
managerial aspects of information security, such as
• access control models
• information security governance
• information security program assessment and metrics
• Network security consists of the policies and practices
adopted to prevent and monitor unauthorized access, misuse,
modification, or denial of a computer network and network-
accessible resources.
• Computer Security is the protection of computing systems
and the data that they store or access.
• Computer and Data security refers to protective digital
privacy measures that are applied to prevent unauthorized
access to computers, databases and websites. Data security
also protects data from corruption. Data security is an
essential aspect of IT for organizations of every size and type.
Approaches to
Information Security
The approaches are
based on:
1. where planning is
sourced and
2. from which direction
the pressure for
success if driven
APPROACHES TO INFO. SECURITY
Bottom Up approach
• Grassroots effort: systems administrators
attempt to improve security of their systems
• Key advantage: technical expertise of
individual administrators
• Seldom works, as it lacks several critical
features:
• Participant support
• Scalability
Top Down approach
• Initiated by upper management
• Issue policy, procedures and processes
• Dictate goals and expected outcomes of
project
• Determine accountability for each required
action
• The most successful also involve formal
development strategy referred to as systems
development life cycle
SECSDLC – FORMAL APPROACH TO INFO. SECURITY
PHASES OF SECSDLC
INVESTIGATION
• Directive from
management
• Creation of security policy
• Teams:
– Analyse problem
– Define Scope
– Specify Goals
– Identify Constraints
• Feasibility Analysis
• Determine:
– Resources
– Commitment
ANALYSIS
Analysis of:
• Existing security policies
• Known threats
• Current controls
• Legal issues –privacy laws on
personal info
Risk Management
– Identify, assess & evaluate risks
levels
– Prioritise risks and manage
them
Threat:
• Threat agent: the cause of danger –
object, person or entity
• Vulnerability: weakness, exposure,
helplessness, defenceless
DESIGN
• LOGICAL DESIGN
Team members:
• Create & develop blue
print for security
• Examine & implement
key policies
• PHYSICAL DESIGN
Team members:
• Evaluate technology to
support security blue
print
• Generate alternative
solutions
• Agree on final design
• Also includes developing
criteria for determining
the definition of
successful solution.
PHASES OF SECSDLC
DESIGN
• Policies
provides rules for protection
of information assets
– Gen/Security program policy
– Issue specific security policy
– System specific security
policy
• SETA
– Security education – building
in-depth education
– Security training – develop
skills & knowledge
– Security awareness –
improving awareness
• Design of controls
– Managerial
– Operational
– Technical
IMPLEMENTATION
• Security solutions acquired,
implemented and tested
• Personnel issues
– Training
– Education programs
• Management of project plan
• Staffing InfoSec function
– Position & name security function
– Understand impact of InfoSec
across IT
– Integrate InfoSec concepts into
personnel management practices
• Information Security
Professionals
– CIO, CISO, Security Manager,
Data Owner, Data Custodian, Data
users
• Professional Certification
MAINTENANCE
• Maintenance Model
• External
monitoring
• Internal monitoring
• Planning & risk
assessment
• Vulnerability
assessment &
remediation –
penetration testing
• Readiness & review -
functionality
MAINTENANCE
MODEL
• Fault Management – id and
address faults
• Configuration & Change
Management – change
components & change
administration
• Accounting Management &
Auditing – system monitoring
• Performance Management
THREATS TO
INFORMATION
SECURITY
Overview of various threats to the
information security.
Potential Acts of Human Error or Failure
Deliberate Acts of Espionage or
Trespass
Deliberate Acts of Information Extortion
Deliberate Acts of Sabotage or
Vandalism
Deliberate Acts of Theft
Deliberate Software Attacks
Forces of Nature
Potential Deviations in Quality of
Service from Service Providers
Technical Hardware Failures or Errors
Technical Software Failures or Errors
Technological Obsolescence
CLASSIFICATION OF
SECURITY VULNERABILITIES
Information security threats are through possible
contact with the gaps in the protection system,
or factors of vulnerability.
The main vulnerabilities are caused by the
following factors:
•Shortcomings of software or hardware
•Different characteristics of the structure of
automated systems in the information flow
•Some operational processes of the system are
inadequate
•Inaccuracy of information exchange protocols
and interface
•Difficult operating conditions and conditions in
which the information is located.
Most often the sources of threats are triggered
in order to obtain illegal benefits after damaging
information. However, accidental effect of
threats due to insufficient protection and mass
attack of a threatening factor is also possible.
If you eliminate or at least mitigate the impact
from vulnerabilities, you can avoid a significant
threat meant to damage the storage system.
Types of
Vulnerabilities
Objective Subjective Random
Random vulnerabilities
These factors vary depending on unforeseen circumstances and features of the information
environment. They are almost impossible to predict in the information space, but you must be prepared
to rapidly eliminate them.
Engineering and technical investigation or a response attack will help to mitigate the following
problems:
1. System failures:
•Caused by malfunctions of technical means at different levels of processing and storage of information
(including those responsible for system performance and access to it).
•Malfunctions and obsolete elements (demagnetization of data carriers, such as diskettes, cables,
connection lines and microchips).
•Malfunctions of different software that supports all links in the chain of information storage and
processing (antiviruses, application and service programs).
•Malfunctions of auxiliary equipment of information systems (power transmission failures).
2. Factors weakening information security:
•Damage to communications such as water supply, electricity, ventilation and sewerage.
•Malfunctions of enclosing devices (fences, walls in buildings, housing of the equipment where
information is stored).
Objective vulnerabilities
They depend on the technical design of the equipment which is installed on the object requiring protection, as well as its
characteristics. It is impossible to escape all these factors, but their partial elimination can be achieved through engineering
techniques in the following cases:
1. Related to emission technical means:
•Electromagnetic techniques (side emission and signals from cable lines, elements of technical means).
•Sound versions (acoustic or with vibration signals).
•Electrical (slip of signals into the circuits of electrical network, through the induction into the lines and conductors, because of
uneven current distribution).
2. Activated:
•Malware, illegal programs, technological exits from programs which are together called ‘implant tools’.
•Hardware implants: introduced directly into telephone lines, electrical networks or premises.
3. Due to the characteristics of a protected object:
•Object location (visibility and absence of a controlled zone around the information object, presence of vibration or sound reflecting
elements around the object, presence of remote elements of the object).
•Arrangement of information exchange channels (use of radio channels, lease of frequencies or use of shared networks).
4. Those that depend on the characteristics of carriers:
•Parts with electro-acoustic modifications (transformers, telephone devices, microphones and loudspeakers, inductors).
•Elements under the influence of electromagnetic field (carriers, microcircuits and other elements).
Subjective vulnerabilities
In most cases, the vulnerabilities of this subtype result from inadequate employee actions at the level of storage and
protection system development. Eliminating such factors is possible using hardware and software:
1. Inaccuracies and gross errors that violate information security:
•At the stage of loading the ready software or preliminary algorithm development, as well as during its use (possibly,
during daily use or during data entry).
•When managing programs and information systems (difficulties in the training to work with the system, individual set
up of services, manipulation of information flows).
•During the use of technical equipment (during switch-on or switch-off, the use of devices for transmitting or receiving
information).
2. System malfunctions in the information environment:
•The mode of protection of personal data (the problem may be caused by laid-off employees or current employees
during off-hours when they get unauthorized access to the system).
•Safety and security mode (when accessing facilities or technical devices).
•While working with devices (inefficient energy use or improper equipment maintenance).
•While working with data (change of information, its saving, search and destruction of data, elimination of defects and
inaccuracies).

Weitere ähnliche Inhalte

Was ist angesagt?

Access_Control_Systems_and_methodology
Access_Control_Systems_and_methodologyAccess_Control_Systems_and_methodology
Access_Control_Systems_and_methodology
Arti Ambokar
 
CP7301 Software Process and Project Management notes
CP7301 Software Process and Project Management   notesCP7301 Software Process and Project Management   notes
CP7301 Software Process and Project Management notes
AAKASH S
 

Was ist angesagt? (20)

Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 
Basic Software Effort Estimation
Basic Software Effort EstimationBasic Software Effort Estimation
Basic Software Effort Estimation
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
Email Forensics
Email ForensicsEmail Forensics
Email Forensics
 
Estimation techniques and risk management
Estimation techniques and risk managementEstimation techniques and risk management
Estimation techniques and risk management
 
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
 
IP tables and Filtering
IP tables and FilteringIP tables and Filtering
IP tables and Filtering
 
Basics & asymptotic notations
Basics & asymptotic notationsBasics & asymptotic notations
Basics & asymptotic notations
 
Lesson plan 2.1 police ethics
Lesson plan 2.1 police ethicsLesson plan 2.1 police ethics
Lesson plan 2.1 police ethics
 
E mail forensics
E mail forensicsE mail forensics
E mail forensics
 
Database forensics
Database forensicsDatabase forensics
Database forensics
 
Information security
Information security Information security
Information security
 
Information risk management
Information risk managementInformation risk management
Information risk management
 
Risks threats and vulnerabilities
Risks threats and vulnerabilitiesRisks threats and vulnerabilities
Risks threats and vulnerabilities
 
IT Risk Management
IT Risk ManagementIT Risk Management
IT Risk Management
 
Chapter 9
Chapter 9Chapter 9
Chapter 9
 
Access_Control_Systems_and_methodology
Access_Control_Systems_and_methodologyAccess_Control_Systems_and_methodology
Access_Control_Systems_and_methodology
 
CP7301 Software Process and Project Management notes
CP7301 Software Process and Project Management   notesCP7301 Software Process and Project Management   notes
CP7301 Software Process and Project Management notes
 
Operating System Forensics
Operating System ForensicsOperating System Forensics
Operating System Forensics
 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenes
 

Ähnlich wie Unit 1&2.pdf

MIS: Information Security Management
MIS: Information Security ManagementMIS: Information Security Management
MIS: Information Security Management
Jonathan Coleman
 
Security & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptxSecurity & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptx
dotco
 

Ähnlich wie Unit 1&2.pdf (20)

Introduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdfIntroduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdf
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
01Introduction to Information Security.ppt
01Introduction to Information Security.ppt01Introduction to Information Security.ppt
01Introduction to Information Security.ppt
 
Cloud Security.pptx
Cloud Security.pptxCloud Security.pptx
Cloud Security.pptx
 
Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptx
 
SECURITY AND CONTROL
SECURITY AND CONTROLSECURITY AND CONTROL
SECURITY AND CONTROL
 
Introduction to information security - by Ivan Nganda
Introduction to information security - by Ivan NgandaIntroduction to information security - by Ivan Nganda
Introduction to information security - by Ivan Nganda
 
Network Security Topic 1 intro
Network Security Topic 1 introNetwork Security Topic 1 intro
Network Security Topic 1 intro
 
ISM-CS5750-01.pptx
ISM-CS5750-01.pptxISM-CS5750-01.pptx
ISM-CS5750-01.pptx
 
Cervone uof t - nist framework (1)
Cervone   uof t - nist framework (1)Cervone   uof t - nist framework (1)
Cervone uof t - nist framework (1)
 
002.itsecurity bcp v1
002.itsecurity bcp v1002.itsecurity bcp v1
002.itsecurity bcp v1
 
MIS: Information Security Management
MIS: Information Security ManagementMIS: Information Security Management
MIS: Information Security Management
 
1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf
 
Information Security
Information Security Information Security
Information Security
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendations
 
Security and Control.ppt
Security and Control.pptSecurity and Control.ppt
Security and Control.ppt
 
Security & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptxSecurity & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptx
 
Security & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptxSecurity & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptx
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 

Kürzlich hochgeladen

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Kürzlich hochgeladen (20)

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 

Unit 1&2.pdf

  • 1. INFORMATION SECURITY Unit I History, What is Information Security?, Critical Characteristics of Information, Components of an Information System, Securing the Components, Balancing Security and Access,
  • 3. HISTORY Please refer to the document “Malware_History” added in Team’s Files
  • 4. • 1960s: Organizations start to protect their computers • 1970s:The first hacker attacks begin • 1980s: Governments become proactive in the fight against cybercrime • 1990s: Organized crime gets involved in hacking • 2000s: Cybercrime becomes treated like a crime • 2010s: Information security becomes serious
  • 5. VARIOUS ASPECTS OF SECURITY Physical Security - to protect the physical items, objects, or areas of an organization from unauthorized access and misuse. Personal Security – to protect the individual or group of individuals who are authorized to access the organization and its operations. Operations Security – to protect the details of a particular operation or series of activities. Communications Security – to protect an organization’s communications media, technology, and content. Network Security – to protect networking components, connections, and contents. Information Security – to protect information assets
  • 6. A C I CIA Triad: 1. Confidentiality ensures information is inaccessible to unauthorized people 2. Integrity ensures the data is accurate and trustworthy by preventing unauthorized modification 3. Availability ensures authorized people can access the information when needed Fundamental principles of Information Security
  • 7. CRITICAL CHARACTERISTICS OF INFORMATION • The value of information comes from the characteristics it possesses: • Availability – available to authorized user on demand • Accuracy – error free to expected standards • Authenticity – original & genuine, not fabrication • Confidentiality – undisclosed to unauthorized people • Integrity – whole, complete, and uncorrupted • Utility – serves the purpose & available in meaningful form • Possession - Information is said to be in possession if one obtains it, independent of format or other characteristic. While a breach of confidentiality always results in a breach of possession,a breach of possession does not always result in a breach of confidentiality.
  • 8. COMPONENTS OF INFORMATION SYSTEM • Information System (IS) is entire set of software, hardware, data, people and networks necessary to use information as a resource in the organization • Software • Exploitation substantial portion of attacks on information • Hardware • Physical security policies • Securing physical location important • Data • Often most valuable asset • Main target of intentional attacks • People • Weakest link • Must be well trained and informed • Networks • Locks and keys won’t work
  • 9. COMPONENTS OF INFORMATION SECURITY • Management of Information Security primarily focuses on the managerial aspects of information security, such as • access control models • information security governance • information security program assessment and metrics • Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network- accessible resources. • Computer Security is the protection of computing systems and the data that they store or access. • Computer and Data security refers to protective digital privacy measures that are applied to prevent unauthorized access to computers, databases and websites. Data security also protects data from corruption. Data security is an essential aspect of IT for organizations of every size and type.
  • 10. Approaches to Information Security The approaches are based on: 1. where planning is sourced and 2. from which direction the pressure for success if driven
  • 11. APPROACHES TO INFO. SECURITY Bottom Up approach • Grassroots effort: systems administrators attempt to improve security of their systems • Key advantage: technical expertise of individual administrators • Seldom works, as it lacks several critical features: • Participant support • Scalability Top Down approach • Initiated by upper management • Issue policy, procedures and processes • Dictate goals and expected outcomes of project • Determine accountability for each required action • The most successful also involve formal development strategy referred to as systems development life cycle
  • 12. SECSDLC – FORMAL APPROACH TO INFO. SECURITY
  • 13. PHASES OF SECSDLC INVESTIGATION • Directive from management • Creation of security policy • Teams: – Analyse problem – Define Scope – Specify Goals – Identify Constraints • Feasibility Analysis • Determine: – Resources – Commitment ANALYSIS Analysis of: • Existing security policies • Known threats • Current controls • Legal issues –privacy laws on personal info Risk Management – Identify, assess & evaluate risks levels – Prioritise risks and manage them Threat: • Threat agent: the cause of danger – object, person or entity • Vulnerability: weakness, exposure, helplessness, defenceless DESIGN • LOGICAL DESIGN Team members: • Create & develop blue print for security • Examine & implement key policies • PHYSICAL DESIGN Team members: • Evaluate technology to support security blue print • Generate alternative solutions • Agree on final design • Also includes developing criteria for determining the definition of successful solution.
  • 14. PHASES OF SECSDLC DESIGN • Policies provides rules for protection of information assets – Gen/Security program policy – Issue specific security policy – System specific security policy • SETA – Security education – building in-depth education – Security training – develop skills & knowledge – Security awareness – improving awareness • Design of controls – Managerial – Operational – Technical IMPLEMENTATION • Security solutions acquired, implemented and tested • Personnel issues – Training – Education programs • Management of project plan • Staffing InfoSec function – Position & name security function – Understand impact of InfoSec across IT – Integrate InfoSec concepts into personnel management practices • Information Security Professionals – CIO, CISO, Security Manager, Data Owner, Data Custodian, Data users • Professional Certification MAINTENANCE • Maintenance Model • External monitoring • Internal monitoring • Planning & risk assessment • Vulnerability assessment & remediation – penetration testing • Readiness & review - functionality
  • 15. MAINTENANCE MODEL • Fault Management – id and address faults • Configuration & Change Management – change components & change administration • Accounting Management & Auditing – system monitoring • Performance Management
  • 16. THREATS TO INFORMATION SECURITY Overview of various threats to the information security. Potential Acts of Human Error or Failure Deliberate Acts of Espionage or Trespass Deliberate Acts of Information Extortion Deliberate Acts of Sabotage or Vandalism Deliberate Acts of Theft Deliberate Software Attacks Forces of Nature Potential Deviations in Quality of Service from Service Providers Technical Hardware Failures or Errors Technical Software Failures or Errors Technological Obsolescence
  • 17.
  • 18.
  • 19. CLASSIFICATION OF SECURITY VULNERABILITIES Information security threats are through possible contact with the gaps in the protection system, or factors of vulnerability. The main vulnerabilities are caused by the following factors: •Shortcomings of software or hardware •Different characteristics of the structure of automated systems in the information flow •Some operational processes of the system are inadequate •Inaccuracy of information exchange protocols and interface •Difficult operating conditions and conditions in which the information is located. Most often the sources of threats are triggered in order to obtain illegal benefits after damaging information. However, accidental effect of threats due to insufficient protection and mass attack of a threatening factor is also possible. If you eliminate or at least mitigate the impact from vulnerabilities, you can avoid a significant threat meant to damage the storage system. Types of Vulnerabilities Objective Subjective Random
  • 20. Random vulnerabilities These factors vary depending on unforeseen circumstances and features of the information environment. They are almost impossible to predict in the information space, but you must be prepared to rapidly eliminate them. Engineering and technical investigation or a response attack will help to mitigate the following problems: 1. System failures: •Caused by malfunctions of technical means at different levels of processing and storage of information (including those responsible for system performance and access to it). •Malfunctions and obsolete elements (demagnetization of data carriers, such as diskettes, cables, connection lines and microchips). •Malfunctions of different software that supports all links in the chain of information storage and processing (antiviruses, application and service programs). •Malfunctions of auxiliary equipment of information systems (power transmission failures). 2. Factors weakening information security: •Damage to communications such as water supply, electricity, ventilation and sewerage. •Malfunctions of enclosing devices (fences, walls in buildings, housing of the equipment where information is stored).
  • 21. Objective vulnerabilities They depend on the technical design of the equipment which is installed on the object requiring protection, as well as its characteristics. It is impossible to escape all these factors, but their partial elimination can be achieved through engineering techniques in the following cases: 1. Related to emission technical means: •Electromagnetic techniques (side emission and signals from cable lines, elements of technical means). •Sound versions (acoustic or with vibration signals). •Electrical (slip of signals into the circuits of electrical network, through the induction into the lines and conductors, because of uneven current distribution). 2. Activated: •Malware, illegal programs, technological exits from programs which are together called ‘implant tools’. •Hardware implants: introduced directly into telephone lines, electrical networks or premises. 3. Due to the characteristics of a protected object: •Object location (visibility and absence of a controlled zone around the information object, presence of vibration or sound reflecting elements around the object, presence of remote elements of the object). •Arrangement of information exchange channels (use of radio channels, lease of frequencies or use of shared networks). 4. Those that depend on the characteristics of carriers: •Parts with electro-acoustic modifications (transformers, telephone devices, microphones and loudspeakers, inductors). •Elements under the influence of electromagnetic field (carriers, microcircuits and other elements).
  • 22. Subjective vulnerabilities In most cases, the vulnerabilities of this subtype result from inadequate employee actions at the level of storage and protection system development. Eliminating such factors is possible using hardware and software: 1. Inaccuracies and gross errors that violate information security: •At the stage of loading the ready software or preliminary algorithm development, as well as during its use (possibly, during daily use or during data entry). •When managing programs and information systems (difficulties in the training to work with the system, individual set up of services, manipulation of information flows). •During the use of technical equipment (during switch-on or switch-off, the use of devices for transmitting or receiving information). 2. System malfunctions in the information environment: •The mode of protection of personal data (the problem may be caused by laid-off employees or current employees during off-hours when they get unauthorized access to the system). •Safety and security mode (when accessing facilities or technical devices). •While working with devices (inefficient energy use or improper equipment maintenance). •While working with data (change of information, its saving, search and destruction of data, elimination of defects and inaccuracies).