Chapter 1
Chapter 1
1
Information Security
■ Information security means protecting information and information systems from
unauthorized access, use, modification, or destruction.
■ The terms information security, computer security and information assurance are frequently
used interchangeably which share the common goals of protecting the confidentiality,
integrity and availability of information.
■ Cryptography can be the better choice for maintaining the privacy of information, which traditionally is used
to protect the secret messages.
■ Similarly, privacy of resources, i.e. resource hiding can be maintained by using proper firewalls.
Confidentiality is sometimes called secrecy or privacy.
■ Example: TrueCrypt
■ Example: Thunderbird
■ Operational Issues
– Cost benefit analysis
– Risk analysis
■ Human Issues
• Prevention
• Detection
• Recovery
for CS & CL 18
Biba Integrity Model
• Rules were designed to ensure data integrity
• Rules about integrity levels prevent inappropriate
modification of data and corruption caused by
introducing unreliable informations
– No Write Up
– No Read Down- Subject cannot read objects of lesser
integrity (trust level)
for CS & CL 19