Foundation of Information Security: Learning Objectives
Foundation of Information Security: Learning Objectives
1
Foundation of Information Security
legislation
Introduction
Information security is a process that moves through phases building and
Course Module
Prevention – taking measures that prevent your assets from being damaged;
Detection – taking measures that allow you to detect when an asset has been
damaged, how it has been damaged, and who has caused the damage;
Prevention
Areas to consider
Security Policy:
must be protected and document these “what’s” in a formal policy. The policy
Security Awareness:
policy. Security awareness programs should be utilized for this purpose. The
wide issues as well as more focused specialized training needs. The program
Access Controls:
Access is the manner by which the user utilizes the information systems to
get information. Naturally all users should not have the ability to access all
Course Module
Detection
threat environment, no matter what level of protection a system may have, it will get
compromised given a greater level of motivation and skill. There is no full proof
when each layer fails, it fails safely to a known state and sounds an alarm. The most
compromise. Intrusion detection systems (IDS) are utilized for this purpose.
Reaction / Response
For the detection process to have any value there must be a timely response. The
decisions or developing policy while under attack is a recipe for disaster. Many
organizations spend a tremendous amount of money and time preparing for disasters
such as tornados, earthquakes, fires and floods. The fact is, the chances are greater
that a computer security incident will occur than any one of these scenarios.
Detection: stolen items are missing, burglar alarms, closed circuit TV.
Reaction: call the police, replace stolen items, makes an insurance claim.
Information Security and Assurance
5
Foundation of Information Security
CIA Triad
Intelligence Agency. The elements of the triad are considered the three most
Confidentiality
data from falling into the hands of people who do not have authorization to
the organization in the case of a data breach. This process may help direct
Course Module
Everyday examples of confidentiality measures include bank card pin
places data is stored and the frequency with which data is transmitted. Air
Integrity
In the IT world, integrity is all about making sure information is accurate and
always stays that way. Common measures to protect integrity include file
Availability
floods and fires, is also necessary to ensure availability. Firewalls and proxy
servers are additional tools that fall under the umbrella of protecting
information availability.
Information Security and Assurance
7
Foundation of Information Security
about security products and will have to pick standard ‘best practice’
requirements.
availability, and integrity of data. In other words, it is all of the practices and
processes that are in place to ensure data isn't being used or accessed by
accurate and reliable and is available when those with authorized access
need it.
entrusted to them, the data should be used according to the agreed purposes
Course Module
Ways to secure data
• Locked servers
Privacy Legislation
The Fair Credit Reporting Act (FCRA) is the act that regulates the collection
information law that allows for the full or partial disclosure of previously
government.
The Privacy Act of 1974 , a United States federal law, establishes a Code of
Fair Information Practice that governs the collection, maintenance, use, and
Information Security and Assurance
9
Foundation of Information Security
The Video Privacy Protection Act (VPPA) was a bill passed by the United
States Congress in 1988 and signed into law by President Ronald Reagan. It
rental or sale records [or similar audio visual materials, to cover items such
activities.
Until the era of the information society, information was a concern mainly for
Focus of Control
In this section we must focus on what is important to manage. We need to
The following are items that needs important attention in terms of data.
is the interface of all uses, we must consider ways to secure it. Take note that
1. Users run application programs that have been tailored to meet specific
application requirements.
3. The services run on top of the operating system, which performs file and
I/O devices.
Complexity vs Assurance
Course Module
In securing systems and application, management must decide on whether
secure its valuable data and information, on the other hand, is complexity the
right way to protect our data and information, or we just need to ensure that
all components of the systems are working in this way we can say assurance
of system is a must, we must check all areas in the system leaving no stone
matter.
additional care to guarantee that the different components define and enforce