Cle Unit-4 Notes
Cle Unit-4 Notes
The three fundamental principles of security are availability, integrity, and confidentiality
and are commonly referred to as CIA or AIC triad which also form the main objective of
any security program. ... All security controls, mechanisms, and safeguards are implemented
to provide one or more of these principles.
The foundation for security is assets that need to be protected (see e.g. Gollman, 1999).
Assets may be people, things created by people or parts of nature. In the area of information
security, the assets are often labelled as information assets, and enclose not only the
information itself but also resources that are in use to facilitate the management of
information (e.g. Bjorck, 2001; ISO/IEe 17799,2001), as depicted in Figure 1.
I claim that it is the information that is the primary asset, and IT and other resources are tools
to facilitate information management. Resources have hence an instrumental value in relation
to the information (of course, information may be highly integrated with resources that
manage the information, e.g. in a database). The term information security expresses
therefore a more holistic view than IT-security, which manifests a more technical view since
technical resources are focused (Oscarson, 2001). As it will be seen in Figure 2, I define IT as
digital tools for managing information. A more exhaustive definition of IT is (translated from
Oscarson, 2001, p 56):
Information technology (IT) is a concept that refers to digital technology, i.e. hard-
and software for creating, collecting, processing, storing, transmitting, presenting and
duplicating information. The information may be in the shape of e.g. sound, text,
image or video, and IT mean hence a merging of the traditional areas of computers,
telecom and media.
IT artefacts in the shape of e.g. personal computers, networks, operative systems and
applications constitute thus one of several types of supporting resources for manage
Information as an asset in organizations is a wide domain of knowledge, and is not only about
information (represented by data) stored in IT-based information systems. A great amount of
an organization's information is non-formalized and is not digitalized or even on print.
Information that seems to be unimportant for one organization may be important to other
actors, e.g. competitors. Some information, e.g. negative publicity, may arise at the same
moment when an incident occurs. For example, the information that an information system
has been hacked may become very sensitive information at the same moment the incident
occurs. Moreover, information as an asset is not only about information that exists in an
organization - it is also important that an organization can obtain relevant and reliable
information when necessary
Figure 3. A graphical description of the CIA triad - Confidentiality, Integrity and Availability
(influenced by Jonsson, 1995; Olovsson, 1992)
For simplifying reasons, the CIA triad will henceforth in the paper be treated as
characteristics of information assets, even if correct definitions in two cases are
characteristics between information assets and users (which may be authorized or
unauthorized).
As discussed, senior management has the ultimate responsibility for protecting the
organization’s information assets. One of these responsibilities is the establishment of the
function of Corporate Information Officer (CIO). The CIO directs the organization’s day-to-
day management of information assets. The ISSO and Security Administrator should report
directly to the CIO and are responsible for the day-to-day administration of the information
protection program. Supporting roles are performed by the service providers and include
Systems Operations, whose personnel design and operate the computer systems. They are
responsible for implementing technical security on the systems. Telecommunications is
responsible for providing communication services, including voice, data, video, and fax. The
information protection professional must also establish strong working relationships with the
audit staff. If the only time you see the audit staff is when they are in for a formal audit, then
you probably do not have a good working relationship. It is vitally important that this liaison
be established and that you meet to discuss common problems at least each quarter. Other
groups include the physical security staff and the contingency planning group. These groups
are responsible for establishing and implementing controls and can form a peer group to
review and discuss controls. The group responsible for application development methodology
will assist in the implementation of information protection requirements in the application
system development life cycle. Quality Assurance can assist in ensuring that information
protection requirements are included in all development projects prior to movement to
production. The Procurement group can work to get the language of the information
protection policies included in the purchase agreements for contract personnel. Education and
Training can assist in developing and conducting information protection awareness programs
and in training supervisors in the responsibility to monitor employee activities. Human
Resources will be the organization responsible for taking appropriate action for any violations
The following are the main benefits of classifying information with security levels:
1. Information Security Classification requires that information first be identified. An
initiative is therefore required to actively discover information that’s created, stored and
handled by different business groups within the organization. By discovering
information, you’re basically rediscovering your business. And this means you can take
a moment to review how information is empowering it or possibly operating
ineffectively.
2. By working with different business groups, the risk and/or information security team
connects face-to-face with business owners and asks them to think – sometimes for the
first time – about information security and how it could impact their business. This
gives the owners a direct contact point they can reach out to if they have questions or
need help managing cyber risks or incidents. Working with the business raises
awareness of cyber risk and information security management to realistic levels,
because it is finally being discussed and taken seriously at all levels within the
organization.
3. Defining and using security information classification optimizes risk and resources,
protecting information both effectively and efficiently. By categorising information
according to its sensitivity and levels of business impact, you are informing your risk
and information security practice of the priority with which information must be
With the main benefits covered, we turn our attention to the process of classifying
information with security labels.
The standard process to classify information is :
1. Identify Information
Use manual methods (workshops, etc.) and automated discovery tools as required.
2. Classify the Information
Assess its business value, impact and sensitivity.
3. Label the Information
Microsoft Document Labels, Office365 Labels, Email Marking, etc
4. Implement Controls
The controls need to be proportional to the information value, importance and
sensitivity.
These include, but are not limited to. security controls that need to be implemented
when the information is stored, shared, disposed of and declassified.
5. Communicate Policy
Appropriately communicate details of the information security classification scheme
within your organization.
Business team should know understand and use the information security classification
schemed correctly.
6. Train on Procedures
Provide training on the information security classification procedure.
Your leadership team should know how to identify and classify new information
moving forward or, at the very minimum, request that the new information be classified
by the responsible team within your organization.
CHALLENGES
Keep the number of information security levels to a minimum. If you’re finding that
you’re using any more than 3 or 4 classification levels, then you’re not keeping it
simple. You’re probably falling into the trap of mapping classification levels to business
groups, locations or data types, or you’re trying to align with multiple standards.
4. Coverage
One of the greatest risks when discovering information to be classified, is that you
never really know whether or not you have actually discovered all of the information
assets. Even when applying a default classification to “all other information”, if you
haven’t discovered any particular information that’s highly sensitive, then there’s a risk
of under-classifying it and therefore leaving it exposed. The problem is more apparent
today as information is dispersed into the cloud, streamed from IoT devices, roaming
around on personal handheld devices and flowing between integrated systems. To
mitigate this risk, refer to your org-chart. Identify all the business units and their
managers, and seek to work with them to conduct information discovery. Don’t despair!
For Governments
Refer to the particular framework used within federal or state governments in your own
country. Local governments should follow the guidelines of their state government. In
Australia, the Australia Government Protective Security Policy Framework is to be used
by the Australian government and its agencies and in the state of New South Wales, for
example, the NSW Government Information Classification, Labelling and Handling
Guidelines should be used. While these two generally align, there are a few dif ferences
(noted below) that need to considered.
It’s also important to define Dissemination Limiting Markers (DLMs) and how they
differ from security classifications. While security classifications are defined by
business impact levels that can damage national security, DLMs are defined by
Below are the classification levels defined for both Federal and NSW State
Government
Australian Government
It’s important that we firstly respect the objective of the Australian Government
Information (Public Access) Act 2009 (GIPA Act), which is to open government
information to the public by:
A public interest test, which requires balancing factors for and against disclosure of
each piece of government information, must be conducted using the guidelines
provided here. You should also obtain advice from your risk management team and your
legal team if you’re unsure whether or not information is to be release or restricted to
public.
Australian Government Information Security Classifications
The referenced table below shows the information security classifications and
sensitivity levels used by the Australian government:
1. Mission
The Committee will advise the Director of Central Intelligence (DCI) on the
establishment of common objectives for Intelligence Community information handling
and coordinate the achievement of these objectives through improvement and
integration of Intelligence Community information handling systems.
2. Definition
Information handling includes the funct ions of receipt of information from collection
sources, dissemination, transformation, indexing, categorization, storage, retrieval and
presentation, automatic data processing, telecommunications, and teleprocessing related
thereto.
3. Functions
a. formulate and recommend to the DCI policies and programs for the
establishment of an Intelligence Community information handling system;
g. in coordination with the DCI SCI Forum3, ensure that the security aspects of
information handling systems are given appropriate consideration; and
The Chairman will establish subcommittees, working groups, and advisory bodies as
necessary to support the work of the Committee.
Following is a list of top 10 Information Security tools that are practiced and used globally;
This is the most promising tool for password cracking and testing the
strength of various passwords and credentials, as well. This tool uses the
brute force technology to decipher or break password security and to be used
as an InfoSec tool. This is an open-source tool, which means anyone can use
it and tweak it to the best of their use. This tools is compatible and can be
used with multiple operating systems such as Linux, Windows, Mac, and or
Android.
2. Nmap
3. Kali Linux
Kali Linux is not an overtly covered or hidden operating system from the
InfoSec professionals, but it is still an operating system for the most part.
Although it favors the presence of various penetration and InfoSec security
tools within its framework that can be sued for investigation among forensics
and different types of security systems as well. You can track, deploy,
configure, search for potential weaknesses, and find other vulnerabilities
among networking, auditing, and various operating systems. The various
tools used from the Kali Linux operating system include;
Aircrack-ng
Hydra
4. NetSparker
Netsparker is the most accurate automated tool that can be used to find
various vulnerabilities in various networking and operating systems. The
vulnerabilities usually unearthed consist of Cross-site scripting and SQL
injections. The devices will provide you with accurate results every time and
not the false positive so that you won't have plenty of hours wasted just like
that using manual testing methods. Although it is only available to be used on
the Windows platform or through online web sources.
5. Retina
The retina is not just your simple web application tool through which you can
find a list of potential vulnerabilities in security networks and related
systems. It provides with something more than that; it can carry out a series
of Pentesting assessments and routine tests to make sure that there aren't any
vulnerabilities and or weaknesses in your system lurking around. It comes out
or is available as a retina community tool or package; it is a commercial
product that requires little to no maintenance and is fully automated, which
means you won't have to regulate its functioning manually. Available at
various operating systems such as Windows, Kali Linux, and Mac or
Android.
Social engineering attacks are the most complicated and technical cyber-
attacks that are not only difficult to identify but also, it is tough to
comprehend their execution. But with the help of the social engineering
toolkit, the identification and or processing of these attacks that target human
behavior becomes very easy. Although it should be mentioned that the tool
should be used for Ethical or White hat hacking purposes purely otherwise,
there can be unsegmented consequences.
7. Nessus
8. Metasploit
It can be used with network servers, web applications, and other operating
systems. It can work perfectly with Windows, Kali Linux, Mac, and Android
systems.
9. Whitehat
Whitehat is a robust tool that brings into account the use of various tools,
Software, and other Pentesting fundamentals, all of which together can help
to create a safe working environment throughout the software development
lifecycle. Perform numerous scanning illustrations, check the integration of
various working systems, and provide accurate results in real-time.
If you want to learn information security tools, then the best way is to enroll
in the best information security courses aligned with those tools, practice
with them, how they operate, what are the various fundamentals that are
covered with these specified tools, and how you can use them to your
advantage or specific working?
10. AirCrack-ng
AirCrack.ng is a customized and secured network security suite that can work
around various security formats such as 802.11 WEP and or WPA-PSK
network systems. You can add particular layers of security to make your
networking systems are secure from cybercriminals and potential hackers
simultaneously. It works by capturing various network packets, which are
then properly analyzed and used to crack the Wi-Fi access. Aircrack-ng
consists of a fancy terminal-based interface that provides the users with
central control of various operations going through. It is only compatible
with Kali Linux systems, excluding Windows and other operating systems.
1. Firewalls
As we know, the firewall is the core of security tools, and it becomes one of the most
important security tools. Its job is to prevent unauthorized access to or from a private
network. It can be implemented as hardware, software, or a combination of both. The
firewalls are used to prevent unauthorized internet users from accessing private
networks connected to the Internet. All messages are entering or leaving the intranet
pass through the firewall. The firewall examines each message and blocks those
messages that do not meet the specified security criteria.
The Firewall is very useful, but it has limitations also. A skilled hacker knew how to
create data and programs that are believing like trusted firewalls. It means that we can
pass the program through the firewall without any problems. Despite these limitations,
firewalls are still very useful in the protection of less sophisticated malicious attacks on
our system.
2. Antivirus Software
3. PKI Services
PKI stands for Public Key Infrastructure. This tool supports the distribution and
identification of public encryption keys. It enables users and computer systems to
securely exchange data over the internet and verify the identity of the other party. We
can also exchange sensitive information without PKI, but in that case, there would be no
assurance of the authentication of the other party.
People associate PKI with SSL or TLS. It is the technology which encrypts the server
communication and is responsible for HTTPS and padlock that we can see in our
browser address bar. PKI solve many numbers of cybersecurity problems and deserves a
place in the organization security suite.
Today's cybercriminals and hackers used more advanced techniques and software to
breach organization security So, there is a necessity for every businesses to be used
more powerful forms of defences of cybersecurity. MDR is an advanced security service
that provides threat hunting, threat intelligence, security monitoring, incident analysis,
and incident response. It is a service that arises from the need for organizations (who
has a lack of resources) to be more aware of risks and improve their ability to detect and
respond to threats. MDR also uses Artificial Intelligence and machine learning to
investigate, auto detect threats, and orchestrate response for faster result.
Managed detection and response is focused on threat detection, rather than compliance.
While some automation is used, MDR also involves humans to monitor our network.
5. Penetration Testing
A pen test attempts the kind of attack a business might face from criminal hackers such
as password cracking, code injection, and phishing. It involves a simulated real-world
attack on a network or application. This tests can be performed by using manual or
automated technologies to systematically evaluate servers, web applications, network
devices, endpoints, wireless networks, mobile devices and other potential points of
vulnerabilities. Once the pen test has successfully taken place, the testers will present us
with their findings threats and can help by recommending potential changes to our
system.
6. Staff Training
In popular usage, the term information refers to facts and opinions provided and
received during the course of daily life: one obtains information directly from other
living beings, from mass media, from electronic data banks, and from all sorts of
observable phenomena in the surrounding environment. A person using such facts and
Interest in information phenomena increased dramatically in the 20th century, and today
they are the objects of study in a number of disciplines, including philosophy, physics,
biology, linguistics, information and computer science, electronic and
communications engineering, management science, and the social sciences. On the
commercial side, the information service industry has become one of the newer
industries worldwide. Almost all other industries—manufacturing and service—are
increasingly concerned with information and its handling. The different, though often
overlapping, viewpoints and phenomena of these fields lead to different (and sometimes
conflicting) concepts and “definitions” of information.
That attempts to categorize the way information is recognized, utilized, and stored in
the memory.
This theory recognizes the ability for a person to control what information is
processed and the changes and developments of these abilities
1. Thinking
2. Analysis Of Stimuli
3. Situational Modification
4. Obstacle Evaluation
1. Thinking
The process of thinking includes the activities of perception of external stimuli,
encoding the same and storing the data so perceived and encoded in one's mental
recesses
2. Analysis Of Stimuli
This is the process by which the encoded stimuli are altered to suit the brain's
cognition and interpretation process to enable decision making. There are four distinct
sub-processes that form a favourable alliance to make the brain arrive at a conclusion
regarding the encoded stimuli it has received and kept stored. These four sub-
processes are encoding, strategization, generalization and automatization
3. Situational Modification
This is the process by which an individual uses his experience, which is nothing other
than a collection of stored memories, to handle a similar situation in future. In case of
certain differences in both situations, the individual modifies the decisions they took
during their previous experience to come up with solutions for the somewhat different
problem
4. Obstacle Evaluation
This step maintains that besides the subject's individual development level, the nature
of the obstacle or problem should also be taken into consideration while evaluating
the subject's intellectual, problem solving and cognitive acumen. Sometimes,
unnecessary and misleading information can confuse the subject and he / she may
show signs of confusion while dealing with a situation which is similar to one he / she
was exposed to before, which he / she was able to handle
1. Sensory Memory
2. Working Memory
3. Long-term Memory
1. Sensory Memory
2. Working Memory
Encoding/Learning Strategies
Elaboration – embellishing on new information based on what you already know (using
prior knowledge)
Environmental factors, e.g., culture, affect the kinds of strategies that children
develop Children are more likely to use effective learning strategies when
teachers and other adults encourage their use, or when it is culturally meaningful
3. Long-term Memory
Symbols – mental entity that represents an external object or event, often without
reflecting its perceptual and behavioral qualities
Logical thinking abilities improve with age
Some logical thinking is evident in infancy
Perceive cause and effect relationships as young
As 6 months old Reasoning is still influenced by personal motives and Biases
Semantic Memory
Autobiographical Memory
Procedural memory involves memories of body movement and how to use objects
in the environment. How to drive a car or use a computer are examples of
procedural memories
Implicit memory - refers to the use of objects or movements of the body, such as
how exactly to use a pencil, drive a car, or ride a bicycle. This type of memory is
encoded and it is presumed stored by the striatum and other parts of the basal
ganglia. The basal ganglia is believed to mediate procedural memory and other
brain structures and is largely independent of the hippocampus. Research by
Priming
Processes that keep information "alive" or help transfer it from one memory stage to
the next:
Attention
Rehearsal
Chunking
Encoding
Retrieval.
1. Attention
Selective attention refers to the learner's ability to select and process certain
information while simultaneously ignoring other information.
Several factors influence attention:
The meaning that the task or information holds for the individual
Similarity between competing tasks or sources of information
Task complexity or difficulty (influenced also by prior
2. Rehearsal
Rehearsal is the process where information is kept in short-term memory by
mentally repeating it.
When the information is repeated each time, that information is reentered into the
short-term memory, thus keeping that information for another 15 to 20 seconds
(the average storage time for short-term memory)
3. Chunking
Chunking is the process by which one can expand his/her ability to remember
things in the short term. Chunking is also a process by which a person organizes
material into meaningful groups.
4. Encoding
Refers to the process of relating incoming information to concepts and ideas
already in memory in such a way that the new material is more memorable.
Various encoding schemes include:
In today’s world, most business facilities require some level of site security. Whether to
due to theft prevention, hazardous chemicals or industrial processes on site, the
protection of business processes and trade secrets, limitation of liability, or threat of
terrorist attack, all organizations have something to protect. This protection can take
many forms, depending upon the asset(s) to be protected and other factors specific to
each organization. Some organizations elect to manage their security apparatus in-
house, while others recognize the benefit of having a professional security organization
assume that responsibility. Unfortunately, it only takes one significant breach of
security to cause an event that cripples an entire organization with potentially
catastrophic collateral consequences as well. Accordingly, the decision to manage
security responsibilities in-house, or the selection of an external security administration
partner, should be taken very seriously with those consequences in mind.
Trident Capabilities
As former ‘top tier’ Special Operations operators, TridentCMG personnel have spent
years in assisting governments, militaries, and business organizations the world over in
developing and managing security programs for all manner of individuals, facilities, and
other assets. Now, this level of expertise and proven experience can be yours when you
select TridentCMG as your security program administration (SPA) partner.
As your SPA partner, TridentCMG will review your existing security plan, if available,
and recommend a prioritized set of improvements for consideration. We will base these
recommendations on our understanding of the client’s security objectives, coupled with
our understanding of threat potentials affecting the client. TridentCMG will develop
budgets covering these prioritized security enhancements, cooperate in the procurement
process, and oversee implementation, as well as subsequent orientation, training, and
operation of the entire security apparatus on behalf of the client.
With respect to security forces, TridentCMG will train and manage a client -provided
security force, or we can provide our own force comprised of highly-trained and
seasoned security professionals, hand-selected by TridentCMG to ensure the client
receives the very best security services available. Wherever the location, whatever the
asset, TridentCMG can provide security to meet any challenge.