Information Security Notes
Information Security Notes
Starting from the right, multiply the first digit by 1, the second by 2 etc.
Add the results together
Use the last digit of the result and add to end of number.
Example: 56037 becomes 560372
Example: 50637 becomes 506376
Symmetric encryption:
In symmetric encryption, you use the same key for both encryption and decryption of your
data or message. Taking the example I gave above, sending a secure message to your
granny, both of you need to have the same key in order to encrypt and decrypt the
messages that you may exchange with each other.
Asymmetric encryption:
Asymmetric encryption is quite the opposite to the symmetric encryption as it uses not one
key but a pair of keys: a private one and a public one.
You use one to encrypt your data, which is called public key, and the other to decrypt the
encrypted message, which is called the private key.
When you encrypt your message using, let’s say, your granny’s public key, that same
message can only be decrypted using her private key.
For example, using network isolation along with strong authentication helps ensure
that the breach of one protection mechanism alone will not be disastrous.
SA capabilities:
Bastion hosts
Out-of-Band (OOB) management
Network isolation
Integrated Lights-Out (ILO), Keyboard Video Mouse (KVM), and power controls
Virtualization and Storage Area Network (SAN) management
Segregation of administration from services
Multi-factor authentication for Systems Administrators (SAs)
Administrator audit trail(s)
Command logging and analytics
Network Security:
Purpose: To protect the enterprise network from unauthorized access
Needs to be considered in terms of the following security controls
Preventive control (firewall and separate sections of the network from each other)
Detective control (detect attacker activity that cannot be blocked)
Monitoring control (capture activity that is input to correlation engines that support
forensics.)
NS: Goals and Objectives:
Block malicious traffic, Monitor and analyze network traffic, Log information about network
traffic.
NS: Threat Vectors:
Attackers enter the enterprise through outbound network connections from servers
or clients on the internal network.
Attackers enter the enterprise through the network connections of Internet-facing
servers.
Attackers use internal networks to move laterally between computers inside the
enterprise.
Attackers use enterprise networks to extract data and remove it from the Enterprise.
Attackers take control of network infrastructure components and then leverage
them to gain entry to the enterprise or to bypass other security measures.
NS: Capabilities:
Switches and routers, Software Defined Networking (SDN), Domain Name System (DNS) and
Dynamic Host Configuration Protocol (DHCP), Network Time Protocol (NTP), Network
service management, Firewall and virtual machine firewall, Network Intrusion
Detection/Network Intrusion Prevention System (IDS/IPS), Wireless networking (Wi-Fi),
Packet intercept and capture, Secure Sockets Layer (SSL) intercept, Network Access Control
(NAC), Virtual Private Networking (VPN) and Internet Protocol Security (IPSec), Network
Traffic Analysis (NTA)
Application Security:
Application security involves security measures that are specific to certain applications or
protocols running over the network.
By this simple definition, application security technologies and capabilities include
e-mail security
application-aware firewall features
database gateways
forward web proxies.
Application security operates alongside network security.
AS: Goal and objectives:
Goal: to protect the enterprise applications from use or attack
Objective:
Authentication
Integrity
Confidentiality
Internet Protocol Security:
The IP security (IPSec) is an Internet Engineering Task Force (IETF) standard suite of
protocols between 2 communication points across the IP network that provide data
authentication, integrity, and confidentiality. It also defines the encrypted, decrypted and
authenticated packets. The protocols needed for secure key exchange and key management
are defined in it.
IP security Overview:
In 1994, IAB report “Security in the Internet Architecture” Identified Key areas for security
Mechanisms
Access control
Connectionless integrity
Data origin authentication
Rejection of replayed packets
a form of partial sequence integrity
Confidentiality (encryption)
Limited traffic flow confidentiality
Transport and Tunnel Modes:
Transport Mode: to encrypt & optionally authenticate IP data, can do traffic analysis but is
efficient, good for ESP host to host traffic
Tunnel Mode: encrypts entire IP packet, add new header for next hop, no routers on way
can examine inner IP header, good for VPNs, gateway to gateway security
Security Associations: (IPSEC)
• a one-way relationship between sender & receiver that affords security services to
the traffic carried on it.
• defined by 3 parameters:
• Security Parameters Index (SPI)
• IP Destination Address
• Security Protocol Identifier
• has a number of other parameters
• seq no, AH & EH info, lifetime etc
• have a database of Security Associations
Encapsulating Security Payload (ESP):
1995: This document is amended and re-published by the British Standards Institute (BSI) in
1995 as BS7799.
2000: In December, BS7799 is again re-published, this time as a fast tracked ISO standard. It
becomes ISO 17799 (or more formally, ISO/IEC 17799).
2005: A new version of ISO 17799 is published. This includes two new sections, and closer
alignment with BS7799-2 processes..
Published standards
ISO/IEC 27001 - Certification standard against which organizations' ISMS may certified
(published in 2005)
ISO/IEC 27002 - The re-naming of existing standard ISO 17799 (last revised in 2005, and
renumbered ISO/IEC 27002:2005 in July 2007)
In preparation
ISO/IEC 27000 - Vocabulary for the ISMS standards ISO/IEC 27003 - ISMS implementation
guide
What is Information?
Information comprises the meanings and interpretations that people place upon the facts
and Data. The value of the information springs from the ways it is interpreted and applied to
make products, to provide services, and so on.
Confidentiality: Making sure that those who should not see information
Integrity: Making sure that the information has not been changed from its original
Availability: Making sure that the information is available for use when you need it
If simplify, ISMS provide a platform where organization recognizes most valuable spots of in
an organization and builds armor-plating to protect them.
Structure of ISO/IEC 27001:2005:
Control Objectives:
Security policy: To provide management direction and support for information security in
accordance with business requirements and relevant laws and regulations. Information
security policy document Review of the information security policy
Organization of Information Security: (Internal)