Information Security Notes
Information Security Notes
The protection of information and its elements including systems, hardware that use, store
and transmit the information.
Information Security Goals in an Organization:
There are three main objectives protected by information security, collectively known as
CIA:
Confidentiality—prevents unauthorized users from accessing information to protect the
privacy of information content. Confidentiality is maintained through access restrictions.
Breaches of confidentiality can occur due to human error, intentional sharing, or malicious
entry.
Integrity—ensures the authenticity and accuracy of information. Integrity is maintained by
restricting permissions for editing or the ability to modify information. Loss of integrity can
occur when analog information is not protected from environmental conditions, digital
information is not transferred properly, or when users make unapproved changes.
Availability—ensures that authorized users can reliably access information. Availability is
maintained through continuity of access procedures, backup or duplication of information,
and maintenance of hardware and network connections. Loss of availability can occur when
networks are attacked due to natural disasters, or when client devices fail.
Data Types:
Public, Private / Internal, Confidential, Secret.
Public: Data is shown to all the end users.
Private/Internal: A group of company peoples only know, but outside peoples should not
know like Personal Identification Number (PIN).
Confidential: Data is used by limited number of private users, and should not be known to
the majority of workers.
Secret: Data is known by the very high authority persons only. Lose of this data may cause
critical damage to the company.
SECURITY TYPES:
Physical Security: Physical security is the protection of personnel, hardware, software,
networks and data from physical actions and events that could cause serious loss or damage
to an enterprise, agency or institution.
Personal Security: To protect the individual or group of individuals who are authorized.
Operation Security: To protect the details of a particular operation or activities. It is a risk
management process that encourages managers to view operations from the perspective of
an adversary in order to protect sensitive information from falling into the wrong hands.
Communication Security: Communications security (COMSEC) is the prevention of
unauthorized access to telecommunications traffic, or to any written information that is
transmitted or transferred.
Network Security: Network security is used to prevent unauthorized or malicious users from
getting inside your network. This ensures that usability, reliability, and integrity are
uncompromised. This type of security is necessary to prevent a hacker from accessing data
inside the network.
Information Security: Information Security refers to the processes and methodologies
which are designed and implemented to protect print, electronic, or any other form of
confidential, private and sensitive information or data from unauthorized access, use,
misuse, disclosure, destruction, modification, or disruption.
Security Mechanisms: Vulnerability, Attack, Threat, Network Security Mechanisms.
Vulnerability: Vulnerabilities are weak points or loopholes in security that an attacker
exploits in order to gain access to the network or to resources on the network.
Attack: Attack is any attempt to destroy, expose, alter, disable, steal or gain unauthorized
access to or make unauthorized use of an asset.
Two types of attack are: Passive Attack, Active Attack.
Passive Attack: A passive attack is a network attack in which a system is monitored and
sometimes scanned for open ports and vulnerabilities.
Active Attack: An active attack is a network exploit in which a hacker attempts to make
changes to data on the target or data en route to the target.
Masquerade – Masquerade attack takes place when one entity pretends to be different
entity. A Masquerade attack involves one of the other form of active attacks.
Modification of messages – It means that some portion of a message is altered or that
message is delayed or reordered to produce an unauthorized effect. For example, a message
meaning “Allow JOHN to read confidential file X” is modified as “Allow Smith to read
confidential file X”.
Threat: In computer security, a threat is a potential negative action or event facilitated by a
vulnerability that results in an unwanted impact to a computer system or application.
Network Security Mechanism: A mechanism that is designed to detect, prevent, or recover
from a security attack.
Different types of security Mechanisms are:
Routing control, Traffic padding, Encipherment, Access Control, Digital Signatures, Data
Integrity.
Routing Control: It Enables selection of particular physically secure routes for certain data
and allows routing changes, especially when a breach of security is suspected.
Traffic Padding: Traffic padding may be used to hide the traffic pattern, which means to
insert dummy traffic into the network and present to the intruder a different traffic pattern.
Encipherment: Encipherment is the process of making data unreadable to unauthorized
entities by applying a cryptographic algorithm (an encryption algorithm). Cryptography
technique is used for enciphering.
Cryptography: Cryptography is the science of keeping information secure by transforming it
into form that unintended recipients cannot understand.
Symmetric Key Cryptography
An encryption system in which the sender and receiver of a message share a single,
common key that is used to encrypt and decrypt the message. The most popular
symmetric–key system is the Data Encryption Standard (DES).
Asymmetric Key Encryption (or Public Key Cryptography)
The encryption process where different keys are used for encrypting and decrypting the
information. Keys are different but are mathematically related, such that retrieving the plain
text by decrypting cipher text is feasible.
Digital Signature: A digital signature is a mathematical technique used to validate the
authenticity and integrity of a message, software or digital document.
Access Control: It uses methods to prove that a user has access rights to the data or
resources owned by a system. E.g. Passwords and Pins.
Data Integrity: Data integrity refers to maintaining and assuring the accuracy and
consistency of data. A variety of mechanisms used to assure the integrity of a data unit or
stream of data units.
Methods of Data Integrity:
A check digit is an extra digit added to a number so that, if a number is changed, the error
will be detected.
Method
Starting from the right, multiply the first digit by 1, the second by 2 etc.
Add the results together
Use the last digit of the result and add to end of number.
Example: 56037 becomes 560372
Example: 50637 becomes 506376
Symmetric encryption:
In symmetric encryption, you use the same key for both encryption and decryption of your
data or message. Taking the example I gave above, sending a secure message to your
granny, both of you need to have the same key in order to encrypt and decrypt the
messages that you may exchange with each other.
Asymmetric encryption:
Asymmetric encryption is quite the opposite to the symmetric encryption as it uses not one
key but a pair of keys: a private one and a public one.
You use one to encrypt your data, which is called public key, and the other to decrypt the
encrypted message, which is called the private key.
When you encrypt your message using, let’s say, your granny’s public key, that same
message can only be decrypted using her private key.
For example, using network isolation along with strong authentication helps ensure
that the breach of one protection mechanism alone will not be disastrous.
SA capabilities:
Bastion hosts
Out-of-Band (OOB) management
Network isolation
Integrated Lights-Out (ILO), Keyboard Video Mouse (KVM), and power controls
Virtualization and Storage Area Network (SAN) management
Segregation of administration from services
Multi-factor authentication for Systems Administrators (SAs)
Administrator audit trail(s)
Command logging and analytics
Network Security:
Purpose: To protect the enterprise network from unauthorized access
Needs to be considered in terms of the following security controls
Preventive control (firewall and separate sections of the network from each other)
Detective control (detect attacker activity that cannot be blocked)
Monitoring control (capture activity that is input to correlation engines that support
forensics.)
NS: Goals and Objectives:
Block malicious traffic, Monitor and analyze network traffic, Log information about network
traffic.
NS: Threat Vectors:
Attackers enter the enterprise through outbound network connections from servers
or clients on the internal network.
Attackers enter the enterprise through the network connections of Internet-facing
servers.
Attackers use internal networks to move laterally between computers inside the
enterprise.
Attackers use enterprise networks to extract data and remove it from the Enterprise.
Attackers take control of network infrastructure components and then leverage
them to gain entry to the enterprise or to bypass other security measures.
NS: Capabilities:
Switches and routers, Software Defined Networking (SDN), Domain Name System (DNS) and
Dynamic Host Configuration Protocol (DHCP), Network Time Protocol (NTP), Network
service management, Firewall and virtual machine firewall, Network Intrusion
Detection/Network Intrusion Prevention System (IDS/IPS), Wireless networking (Wi-Fi),
Packet intercept and capture, Secure Sockets Layer (SSL) intercept, Network Access Control
(NAC), Virtual Private Networking (VPN) and Internet Protocol Security (IPSec), Network
Traffic Analysis (NTA)
Application Security:
Application security involves security measures that are specific to certain applications or
protocols running over the network.
By this simple definition, application security technologies and capabilities include
e-mail security
application-aware firewall features
database gateways
forward web proxies.
Application security operates alongside network security.
AS: Goal and objectives:
Goal: to protect the enterprise applications from use or attack
Objective: