ITEC85 Reviewer
ITEC85 Reviewer
Information Security
•The computer age introduced a new element to businesses, universities, and a multitude of other
organizations: a set of components called the information system, which deals with collecting and
organizing data and information
Computer Hardware
• can be as small as a smartphone that fits in a pocket or as large as a supercomputer
• includes the peripheral devices, such as keyboards, external disk drives, and routers
Computer Software
• The role of software is to let hardware knows what to do.
• It’s like our brain is the software and our body are the hardware.
• It sends signals and tasks.
• It is divided by two application software and system software.
Telecommunications
• This component connects the hardware together to form a network.
• A network is a set of a computers that is connected by wired or wireless.
• There is a local area network (LAN) and wide area network (WAN).
SDLC is used by analysts to develop an information system. SDLC includes the following activities
•Requirements
•Design
•Implementation
•Testing
•Deployment
•Operations
•Maintenance
Phases of SDLC
Systems Development Life Cycle is a systematic approach which explicitly breaks down the work into
phases that are required to implement either new or modified Information System.
•As an Art, it analyzes threats to information assets and their risk. It employs countermeasures to
reduce risks, such as shutting down unneeded services and strengthening the operating system.
Strengthen the network perimeter with firewalls.
•As a Science, it is the discovery and knowing of something which can be demonstrated and verified
within a community. For example, modern cryptography, defining what security is and making verifiable
statements that algorithms are secure.
Cryptography
Algorithm
• According to Kathleen Richards, Cryptography is a method of protecting information and
communications through the use of codes, so that only those for whom the information is intended can
read and process it. The prefix "crypt-" means "hidden" or "vault" -- and the suffix "-graphy" stands for
"writing."
Terminology
• Algorithm: a finite list of well-defined instructions for accomplishing some task that, given an initial
state, will terminate in a defined end state.
• Cipher: the core algorithm used to encrypt data. A cipher transforms plaintext into ciphertext that is
not reversible without a key.
• Ciphertext: text in encrypted form, as opposed to the plain text
• Codes: a list of equivalences (a codebook) allows the substitution of meaningful text for words,
phrases, or sentences in an innocuous message;
• for example, “Okay, OTW na ako.” might be decoded to mean “Just woke up.”
• Decrypt/Decipher: the process of retrieving the plaintext from the ciphertext.
• Encrypt/Encipher: to alter plaintext using a secret code so as to be unintelligible to unauthorized
parties.
• Key: a word or system for solving a cipher or code.
• Plaintext: the original message to be encoded or enciphered.
Encryption
• ability to transform data.
• authorized persons are just one of the many valuable services performed by the technology commonly
referred to as encryption.
• encryption technology in basic terms and to describe its application in areas such as file encryption,
message scrambling, authentication, and secure Internet transactions to communicate securely and to
store information safely.
Diagram of Cryptographic Terms
Encrypting a Message
Key
• scramble the contents of a file or message using some form of shared secret as a key
• the scrambled data remain hidden and cannot be unscrambled or decrypted.
Keyspace
• total number of possible keys for an encryption algorithm
• a function of the length of the key and the number of possible values in each position of the key
• For a keylength of n positions, with each position having v possible values, then the keyspace for that
key would be vn.
• For example, with three positions and two values per position (e.g., 0 or 1), the possible keys would be
000, 001, 010, 011, 100, 101, 110, and 111 for a total keyspace of 8. v = 2 (0,1) n = 3 positions
Confidentiality
• The role of encryption in protecting confidentiality can be seen in a classic definition of encryption:
“Encryption is a special computation that operates on messages, converting them into a
representation that is meaningless for all parties other than the intended receiver.”
Integrity
• integrity of data is often as important as keeping them confidential
• When writing checks, people take pains to thwart alteration of the payee or the amount.
• integrity is more important than confidentiality
• Changing the contents of a company press release as it passes from the company to the press could
have serious consequences.
• It is not only human actions that threaten data integrity; mechanical failures and logical errors can also
change data.
Authentication
• the ability to confirm the identity of users
• For example, many computers now ask users to log on before they can access data. By requesting a
user name and password, systems attempt to assure themselves that only authentic users can gain
access.
• However, this form of authentication is limited, it merely assures that the person logging on is
someone who knows a valid user name and password pair.
Nonrepudiation
• An aspect of computer security that has increased greatly in significance, due to the growth in
internetwork transactions, is nonrepudiation.
• For example, if someone places an electronic order to sell stocks that later increase in value, it is
important to prove that the order definitely originated with the individual who placed it.
• Made possible by public key cryptography, nonrepudiation helps ensure that the parties to a
communication cannot deny having participated in all or part of the communication.
Limitations
• One role that cryptography cannot fill is defense against data destruction.
• Although encryption does not assure availability, it does represent a very valuable extra line of defense
for computer information when added to physical security, system access controls, and secure channels
of communication.
SECURITY MANAGEMENT
BUSINESS NEED FIRST
Let’s focus in Cyber, Computer, Technology Risk/Data Breaches. As new technology emerges, new
threats are highly plausible to come too. Below are the threats and vulnerabilities.
•Security is very essential, because when a company ignores that, it exposes itself to risk.
•Huge amount of data can be stolen at any time.
•Few businesses don’t take this seriously and end up with financial loses and bruised reputation.
What are the benefits of SDL?
The most important reasons to adopt SDL practices are:
Higher security. In SDL, continuous monitoring for vulnerabilities results in better application quality and
mitigation of business risks.
Cost reduction. In SDL, early attention to flaws significantly reduces the effort required to detect and fix
them.
Types of Law
● Civil law comprises a wide variety of laws that govern a nation or state.
● Criminal law addresses activities and conduct harmful to society, and is actively enforced by the state.
● Private law encompasses family law, commercial law, and labor law, and regulates the relationship
between individuals and organizations.
● Public law regulates the structure and administration of government agencies and their relationships
with citizens, employees, and other governments.
Relevant US Law
● Historically, the United States has been a leader in the development and implementation of
information security legislation to prevent misuse and exploitation of information and information
technology.
Privacy
● Many organizations are collecting, swapping, and selling personal information as a commodity, and
many people are looking to governments for protection of their privacy.
Privacy of CustomerInformation
● The Privacy of Customer Information Section of the common carrier regulation states that any
proprietary information shall be used explicitly for providing services.
Identity Theft
● The Federal Trade Commission (FTC) describes identity theft as “occurring when someone uses your
personally identifying information, like your name without permission.
Illicit Use
● The study respondents unilaterally condemned viruses, hacking, and other forms of system abuse.
● Fear of penalty - Potential offenders must fear the penalty. Threats of informal reprimand may not
have the same impact as the threat of imprisonment or forfeiture of pay.
● Probability of being caught - Potential offenders must believe there is a strong possibility of being
caught. Penalties will not deter illegal or unethical behavior unless there is reasonable fear of being
caught.
● Probability of penalty being administered - Potential offenders must believe that the penalty will in
fact be administered.