Lecture 1 - Information Security Basics
Lecture 1 - Information Security Basics
Lecture 1 - Information Security Basics
SCHOOL OF SCIENCE
Course Content
Key concepts in Information Security. Information Security in Networked Enterprises. Threats and
vulnerabilities analysis. Risk management. Effective System. Policies. ICT Security planning.
Operational issues in ICT security (incident handling, training, backups etc). Physical security. Types and
uses of security devices. Business Continuity and Disaster Recovery Planning. Network Security;
(identification and authentication, logical access control, Routers, Proxies, and Firewalls audit trails and
cryptography, Auditing Information Systems
Assessment
Continuous Assessment Tests (CATs): 30%
End of Semester Written Examinations: 70%
Learning Materials
1
LECTURE 1
PART I: Key concepts in Information Security
Information security is the practice of defending information from unauthorized access, use, disclosure,
disruption, modification, perusal, inspection, recording or destruction.
It is also defined as preservation of confidentiality, integrity and availability of information. Other
properties, such as authenticity, accountability, non-repudiation and reliability can also be involved.
Two major aspects of information security are:
IT security: (Also computer security), It is responsible for keeping all of the technology within
the company secure from malicious cyber attacks that often attempt to breach into critical private
information or gain control of the internal systems.
Information assurance: The act of ensuring that data is not lost when critical issues arise. These
issues include: natural disasters, computer/server malfunction, physical theft, or any other
instance where data has the potential of being lost.
Basic principles
Confidentiality
Is a set of rules or a promise that limits access or places restrictions on certain types of information.
Confidentiality refers to limiting information access and disclosure to authorized users -- "the right
people" -- and preventing access by or disclosure to unauthorized ones -- "the wrong people."
Authentication methods like user-IDs and passwords, that uniquely identify data systems' users and
control access to data systems' resources, underpin the goal of confidentiality.
Integrity
Data integrity means maintaining and assuring the accuracy and consistency of data over its entire
life-cycle.
Data cannot be modified in an unauthorized or undetected manner.
Integrity is violated when a message is actively modified in transit.
Availability
This means that the computing systems used to store and process the information, the security controls
used to protect it, and the communication channels used to access it must be functioning correctly.
High availability systems aim to remain available at all times, preventing service disruptions due to
power outages, hardware failures, and system upgrades.
Ensuring availability involves preventing denial-of-service attacks, such as a flood of incoming
messages to the target system essentially forcing it to shut down.
Non-repudiation
It implies that one party of a transaction cannot deny having received a transaction nor can the other party
deny having sent a transaction.
2
The nature of the efforts that the information systems support; the natural, technical and human risks to
those endeavors; governing legal, professional and customary standards -- all of these will condition how
CIA standards are set in a particular situation.
Common Terms
Risk is the likelihood that something bad will happen that causes harm to an informational asset (or
the loss of the asset).
Vulnerability is a weakness that could be used to endanger or cause harm to an informational asset.
A threat is anything (manmade or act of nature) that has the potential to cause harm.
The likelihood that a threat will use a vulnerability to cause harm creates a risk. When a threat does
use a vulnerability to inflict harm, it has an impact
Impact is a loss of availability, integrity, and confidentiality, and possibly other losses (lost income,
loss of life, loss of real property). It should be pointed out that it is not possible to identify all risks,
nor is it possible to eliminate all risk. The remaining risk is called "residual risk".
A risk assessment is carried out by a team of people who have knowledge of specific areas of the
business.
3
4. When Left on Their Own, People Tend to Make the Worst Security Decisions - Takes little to
convince someone to give up their credentials in exchange for trivial or worthless goods.
Many people are easily convinced to double-click on the attachment
5. Functional and Assurance Requirements - Functional requirements - Describe what a system should
do.
Assurance requirements - Describe how functional requirements should be implemented and
tested
These principles are mixed and matched to describe why certain security functions and operations exist in
the real world of IT
Exercise
What are the elements of a good security program?
Why is it difficult to secure information systems?
4
PART II
Information Security in Networked Enterprises
Your typical security engineer may say it must have firewalls, intrusion detection or any number of
security focused technologies.
Meanwhile a security tester may suggest that it is conducting penetration testing to provide assurances
that security widgets are working well.
Information security is about adopting the right measures and controls for a given entity at a given point
in time. Threats change and vulnerabilities are introduced or removed, demanding that security evolves
simply to keep pace.
2: Security reporting
Reporting provides a "heartbeat" for information security across an organisation. It ensures the right
people remain up to date on the latest incidents, threats and initiatives that will influence the security
posture.
Regular reporting ensures those that are accountable for securing information assets are aware of the risks
they may have inherited and the rigour in the controls that protect them.
Security reports must be written for their audience and this is an area where security professionals often
fall down.
The content must be accurate but presented at a level that can be consumed by the target audience.
Reports destined for technologists with an appreciation of the hands on should be literal and explain any
vulnerabilities and controls in technical terms.
Those intended for managers with a technical background should be explained conceptually and include
references to technical detail that supports any conclusions.
Those intended for parties outside the technology group such as the CEO or chief risk officer should
wholly focus on the business impact where the conclusions are justified by a well-designed and
established.
5
3: Develop Governance
For an organisation to maintain a consistent security posture people within that organisation must have
clear instructions that tells them how to behave. Governance ensures that people are aware how they
should conduct themselves and if well constructed encourages them to behave in a way that maintains or
may even improve security. There are useful standards such as those produced by International Standards
Organisation, National Institute for Standards and Technology and the Government Communications .
6
One of the most commonly practiced assurance measures is penetration testing. It provides a high level of
assurance that the tested technology would be resistant to a targeted attack by an skilled attacker. It is
however relatively expensive and often tightly scoped. Given the specialized nature of security testing it
could be worth considering using a third party security practitioner. A practitioner can ensure that the
scope is appropriate and that the tester is reputable.
7
COMP 425 : INFORMATION SYSTEMS SECURITY
CAT 1