0% found this document useful (0 votes)
79 views

Foundation of Information Security: Learning Objectives

This document discusses the foundations of information security. It covers the importance of prevention, detection, and response to security incidents. The CIA triad of confidentiality, integrity, and availability is also explained as being crucial to information security. Prevention methods include security policies, awareness programs, and access controls. Detection relies on intrusion detection systems, while response requires having an incident response plan in place.

Uploaded by

Jenny Apilado
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
79 views

Foundation of Information Security: Learning Objectives

This document discusses the foundations of information security. It covers the importance of prevention, detection, and response to security incidents. The CIA triad of confidentiality, integrity, and availability is also explained as being crucial to information security. Prevention methods include security policies, awareness programs, and access controls. Detection relies on intrusion detection systems, while response requires having an incident response plan in place.

Uploaded by

Jenny Apilado
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Information Security and Assurance

1
Foundation of Information Security

Foundation of Information Security


Learning Objectives

At the end of the module the student is expected to:

1. Understand the importance information security

2. Know the importance of prevention, detection and response

3. Understand the CIA Triad and its importance to security

4. Understand the dilemma of computer security

5. Enumerate and understand the different laws/act of US under privacy

legislation

6. Understand the Dimensions of Computer security

Introduction
Information security is a process that moves through phases building and

strengthening itself along the way. Computer security, also known

as cybersecurity or IT security, is the protection of information systems from

theft or damage to the hardware, the software, and to the information on

them, as well as from disruption or misdirection of the services they provide.

Security is about the protection of assets. A rough classification of protection

measures distinguishes between the following:

Course Module
Prevention – taking measures that prevent your assets from being damaged;

Detection – taking measures that allow you to detect when an asset has been

damaged, how it has been damaged, and who has caused the damage;

Reaction / Response – taking measures that allow you to recover your

assets or to recover from damage to your assets.

Prevention

Make no mistake, organization must prepare for the cyber battles by

sharpening skills. Information security professionals must continuously

master / enhance their capabilities by working smarter not harder. It is always

better to prevent, then to pursue and prosecute. Preventing an incident

requires careful analysis and planning.

Information is an asset that requires protection commensurate with its value.

Security measures must be taken to protect information from unauthorized

modification, destruction, or disclosure whether accidental or intentional.

Areas to consider

Security Policy:

The first objective in developing a prevention strategy is to determine “what”

must be protected and document these “what’s” in a formal policy. The policy

must define the responsibilities of the organization, the employees and


Information Security and Assurance
3
Foundation of Information Security

management. It should also fix responsibility for implementation,

enforcement, audit and review.

Security Awareness:

Security awareness is a process that educates employees on the importance

of security, the use of security measures, reporting procedures for security

violations, and their responsibilities as outlined in the information security

policy. Security awareness programs should be utilized for this purpose. The

program should be a continuous process that maintains an awareness level

for all employees. The program should be designed to address organization

wide issues as well as more focused specialized training needs. The program

should stress teamwork and the importance of active participation. To

motivate individuals, a recognition process should be adopted to give out

awards or rewards for employees that perform good security practices.

Access Controls:

Access is the manner by which the user utilizes the information systems to

get information. Naturally all users should not have the ability to access all

systems and its information. Access should be restricted and granted on a

need to know basis.

Course Module
Detection

Detection of a system compromise is extremely critical. With the ever increasing

threat environment, no matter what level of protection a system may have, it will get

compromised given a greater level of motivation and skill. There is no full proof

“silver bullet” security solution. A defense in layers strategy should be deployed so

when each layer fails, it fails safely to a known state and sounds an alarm. The most

important element of this strategy is timely detection and notification of a

compromise. Intrusion detection systems (IDS) are utilized for this purpose.

Reaction / Response

For the detection process to have any value there must be a timely response. The

response to an incident should be planned well in advance. Making important

decisions or developing policy while under attack is a recipe for disaster. Many

organizations spend a tremendous amount of money and time preparing for disasters

such as tornados, earthquakes, fires and floods. The fact is, the chances are greater

that a computer security incident will occur than any one of these scenarios.

Equivalent if not more effort and resources should be expanded on a computer

security incident response plan.

Examples: Consider this example

Prevention: locks at doors, window bars, walls round the property.

Detection: stolen items are missing, burglar alarms, closed circuit TV.

Reaction: call the police, replace stolen items, makes an insurance claim.
Information Security and Assurance
5
Foundation of Information Security

CIA Triad

Confidentiality, integrity and availability, also known as the CIA triad, is a

model designed to guide policies for information security within an

organization. The model is also sometimes referred to as the AIC triad

(availability, integrity and confidentiality) to avoid confusion with the Central

Intelligence Agency. The elements of the triad are considered the three most

crucial components of security.

Confidentiality is a set of rules that limits access to information, Integrity is the

assurance that the information is trustworthy and accurate, and Availability is

a guarantee of reliable access to the information by authorized people.

Confidentiality

Confidentiality is synonymous with privacy. Confidentiality measures prevent

data from falling into the hands of people who do not have authorization to

access said information. In organizations that store large amounts of

information, data may be classified based on how detrimental it would be to

the organization in the case of a data breach. This process may help direct

development of varying levels of security.

Course Module
Everyday examples of confidentiality measures include bank card pin

numbers, routing numbers on checks and email passwords. Two-factor

authentication, which means using a combination of confidentiality measures

such as a password and finger print identification, is common in the

professional world. Other aspects of confidentiality include limiting how many

places data is stored and the frequency with which data is transmitted. Air

gapped computers, disconnected storage devices and keeping only hard

copies of documents are all stronger types of confidentiality measures.

Integrity

In the IT world, integrity is all about making sure information is accurate and

always stays that way. Common measures to protect integrity include file

permissions and version controls to prevent accidental changes or deletion.

Ensuring integrity also requires protection against non-human-related errors

such as server crashes. Most importantly, information must be backed up to

allow quick recovery when disasters happen.

Availability

Ensuring availability requires routine maintenance and upgrading of

hardware, software and operating system environments. Maintaining

adequate bandwidth to limit bottlenecks and developing a comprehensive

disaster recovery plan, which includes consideration of natural disasters like

floods and fires, is also necessary to ensure availability. Firewalls and proxy

servers are additional tools that fall under the umbrella of protecting

information availability.
Information Security and Assurance
7
Foundation of Information Security

Dilemma of computer security

As the number of users relying on computer security has grown from

a few organizations dealing with classified data to everyone connected to the

Internet, the requirements on computer security have changed radically.

Security unaware users have specific security requirements but no

security expertise. A security-unaware user cannot make educated decisions

about security products and will have to pick standard ‘best practice’

solutions. Standard solutions may not address the user’s specific

requirements.

Data Privacy and Data Security

Data security is commonly referred to as the confidentiality,

availability, and integrity of data. In other words, it is all of the practices and

processes that are in place to ensure data isn't being used or accessed by

unauthorized individuals or parties. Data security ensures that the data is

accurate and reliable and is available when those with authorized access

need it.

Data privacy is suitably defined as the appropriate use of data. When

companies and merchants use data or information that is provided or

entrusted to them, the data should be used according to the agreed purposes
Course Module
Ways to secure data
• Locked servers

• Removable hard drives that are locked when not in use

• Hard disk drives requiring special tools for detachment

• Physical cages around computers that prohibit access

• Password protect files

Privacy Legislation

Fair Credit Reporting Act – 1970

The Fair Credit Reporting Act (FCRA) is the act that regulates the collection

of credit information and access to your credit report. It was passed

in 1970 to ensure fairness, accuracy and privacy of the personal information

contained in the files of the credit reporting agencies.

Freedom of Information Act – 1970

The Freedom of Information Act (FOIA), is a federal freedom of

information law that allows for the full or partial disclosure of previously

unreleased information and documents controlled by the United States

government.

Federal Privacy Act – 1974

The Privacy Act of 1974 , a United States federal law, establishes a Code of

Fair Information Practice that governs the collection, maintenance, use, and
Information Security and Assurance
9
Foundation of Information Security

dissemination of personally identifiable information about individuals that is

maintained in systems of records by federal agencies.

Video Privacy Protection act – 1988

The Video Privacy Protection Act (VPPA) was a bill passed by the United

States Congress in 1988 and signed into law by President Ronald Reagan. It

was created to prevent what it refers to as "wrongful disclosure of video tape

rental or sale records [or similar audio visual materials, to cover items such

as video games and the future DVD format.

Computer Matching and Privacy Protections Act – 1988

These provisions add procedural requirements for agencies to follow when

engaging in computer-matching activities, provide matching subjects with

opportunities to receive notice and to refute adverse information before

having a benefit denied or terminated, and require that agencies engaged in

matching activities establish Data Protection Boards to oversee those

activities.

Dimensions of Computer Security

Until the era of the information society, information was a concern mainly for

organizations whose line of business demanded a high degree of security.

However, the growing use of information technology is affecting the status of

information security so that it is gradually becoming an area that plays an


Course Module
important role in our everyday lives. As a result, information security issues

should now be regarded on a par with other security issues.

Focus of Control
In this section we must focus on what is important to manage. We need to

priorities area in terms of security measures. Top Management must provide

the direction where to go and IT experts must suggest ways on how to

improve security measures.

The following are items that needs important attention in terms of data.

1. format and content of data items

2. operations that may be performed on a data item

3. users who are allowed to access a data item

The Man–Machine Scale

In section focuses on hardware model of a computer system. Since hardware

is the interface of all uses, we must consider ways to secure it. Take note that

it’s not only hardware but also software must be considered.


Information Security and Assurance
11
Foundation of Information Security

Hardware and Software levels

1. Users run application programs that have been tailored to meet specific

application requirements.

2. The application programs may make use of the services provided by a

general purpose software package such as a database management system

(DBMS), an object reference broker (ORB), or a browser.

3. The services run on top of the operating system, which performs file and

memory management and controls access to resources such as printers and

I/O devices.

4. The operating system may have a kernel (micro-kernel, hypervisor) that

mediates every access to the processor and to memory.

5. The hardware, i.e. processors and memory, physically stores and

manipulates the data held in the computer system.

Complexity vs Assurance

Course Module
In securing systems and application, management must decide on whether

they prepare complexity vs assurance. Hackers are developing smarter tools

to penetrate to organizations systems, so systems developers must outsmart

them by creating complex application, in this way organization are sure to

secure its valuable data and information, on the other hand, is complexity the

right way to protect our data and information, or we just need to ensure that

all components of the systems are working in this way we can say assurance

of system is a must, we must check all areas in the system leaving no stone

un-turn. Management together with IT experts must look closely on this

matter.

Centralized or Decentralized Controls

If there is a single central entity in charge of security, then it is easy to achieve

uniformity, but this central entity may become a performance bottleneck.

Conversely, a distributed solution may be more efficient but we have to take

additional care to guarantee that the different components define and enforce

the policy consistently.

You might also like