100% found this document useful (1 vote)
289 views21 pages

Modifications by Prof. Dong Xuan and Adam C. Champion: Principles of Information Security, 5th Edition 1

This document outlines the key topics covered in an information security course. It discusses the history of information security from early mainframes through the development of ARPANET and the Internet. The document defines information security as protecting information and systems that use, store, and transmit information. It also emphasizes that security requires balancing protection with reasonable access.

Uploaded by

daniya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
289 views21 pages

Modifications by Prof. Dong Xuan and Adam C. Champion: Principles of Information Security, 5th Edition 1

This document outlines the key topics covered in an information security course. It discusses the history of information security from early mainframes through the development of ARPANET and the Internet. The document defines information security as protecting information and systems that use, store, and transmit information. It also emphasizes that security requires balancing protection with reasonable access.

Uploaded by

daniya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

Introduction

Modifications by Prof. Dong Xuan


and Adam C. Champion

Principles of Information Security, 5th Edition

Learning Objectives
Upon completion of this material, you should be
able to:
Understand the definition of information security
Understand the key terms and critical concepts of
information security
Comprehend the history of computer security and
how it evolved into information security

Principles of Information Security, 5th Edition

Administrative Matters
Syllabus
Class website:
http://cse.osu.edu/~champion/4471/
Group project
Textbook (4th ed. preferable)
Readings
Chaps. 12 in the book

Principles of Information Security, 5th Edition

What is an Information System?


Information System (IS) is an entire set of
software, hardware, data, people, procedures, and
networks necessary to use information as a
resource in the organization

Principles of Information Security, 5th Edition

Critical Characteristics of Information


The value of information comes from the characteristics it
possesses:

Confidentiality: self-explanatory
Integrity: (Bitwise) identical to the original
Availability: of info, services, etc.
Authenticity: it is what it claims to be
Accuracy: free from mistakes and errors
Utility: self-explanatory
Possession: different from confidentiality

Others: user authentication, auditability, non-repudiation


Principles of Information Security, 5th Edition

What is Security?
Definitions:
Book: The quality or state of being secureto be free from danger
James Anderson, Inovant: Well-informed sense that information risks
and controls are in balance
Rita Summers, IBM Systems Journal, 1984: Includes concepts,
techniques and measures that are used to protect computing systems and
the information they maintain against deliberate or accidental threats

A successful organization should have multiple layers of security


in place:

Physical security
Personal security
Operations security
Communications security
Network security
Information security

Principles of Information Security, 5th Edition

What is Information Security?


The protection of information and its critical
elements, including systems that use, store, and
transmit that information
Necessary tools: policy, awareness, training,
education, technology

Principles of Information Security, 5th Edition

Principles of Information Security, 5th Edition

Securing Components in an Information


System
Computer (software and hardware) is the key
component in an information system
Computer can be subject of an attack and/or the
object of an attack
When the subject of an attack, computer is used as
an active tool to conduct attack
When the object of an attack, computer is the entity
being attacked
Principles of Information Security, 5th Edition

Figure 1-5 Subject and Object


of Attack

Principles of Information Security, 5th Edition

10

Balancing Information Security and


Access
Impossible to obtain perfect securityit is a
process, not an absolute
Security should be considered balance between
protection and availability
To achieve balance, level of security must allow
reasonable access, yet protect against threats

Principles of Information Security, 5th Edition

11

Figure 1-6 Balancing Security


and Access

Principles of Information Security, 5th Edition

12

History of Information Security


Began immediately after the first mainframes
were developed
Groups developing code-breaking
computations during World War II created
the first modern computers

Principles of Information Security, 5th Edition

13

Figure 1-1 The Enigma

Principles of Information Security, 5th Edition

14

The 1960s
Advanced Research Procurement Agency (ARPA)
began to examine feasibility of redundant
networked communications
Larry Roberts developed ARPANET from its
inception

Principles of Information Security, 5th Edition

15

Figure 1-2 - ARPANET

Principles of Information Security, 5th Edition

16

The 1970s and 80s


ARPANET grew in popularity as did its potential for
misuse
Fundamental problems with ARPANET security were
identified
No safety procedures for dial-up connections to
ARPANET
Non-existent user identification and authorization to
system

Late 1970s: microprocessor expanded computing


capabilities and security threats
Principles of Information Security, 5th Edition

17

R-609
Information security began with Rand Report R-609
(paper that started the study of computer security)
Scope of computer security grew from physical
security to include:
Safety of data
Limiting unauthorized access to data
Involvement of personnel from multiple levels of an
organization

Principles of Information Security, 5th Edition

18

The 1990s
Networks of computers became more common; so
too did the need to interconnect networks
Internet became first manifestation of a global
network of networks
In early Internet deployments, security was treated
as a low priority

Principles of Information Security, 5th Edition

19

The Present
The Internet brings millions of computer networks
into communication with each othermany of
them unsecured
Ability to secure a computers data influenced by
the security of every computer to which it is
connected
The same problems apply for emerging networked
computer systems, e.g., smartphones
Principles of Information Security, 5th Edition

20

Summary
Information security is a well-informed sense of
assurance that the information risks and controls
are in balance.
Security should be considered a balance between
protection and availability.
Computer security began immediately after first
mainframes were developed

Principles of Information Security, 5th Edition

21

You might also like