Lec 1 Introduction To Information Security
Lec 1 Introduction To Information Security
Information Security
Lecture-1
Engr. Asim Javaid
1 2 3
Objectives Define information
security and its
significance in
Trace the historical
evolution of
information security.
Introduce
fundamental
concepts:
modern contexts. Confidentiality,
Integrity, Availability
(CIA)
Definition and
Importance of Explanation of information security as a discipline.
Information Significance in protecting assets, data, and systems.
Security
1970s
Birth of Modern Computing
•With the emergence of computers, the need for securing data increased.
IBM's creation of the Data Encryption Standard (DES) in the 1970s was a
significant milestone in cryptography, though it was later replaced due to
its vulnerabilities
Rise of Hackers
•The 1980s saw the rise of computer hackers exploring system
vulnerabilities and weaknesses. This era gave birth to both ethical
hacking (white hat hackers) and malicious hacking activities
1980s
1990s - Internet Expansion and Security Challenges
• Methods
• Encryption, access controls, authentication mechanisms, and data
classification are among the methods used to enforce
confidentiality.
• Importance
• Protecting sensitive information such as personal data, trade
secrets, and financial records from unauthorized access or
disclosure is crucial for maintaining confidentiality.
Confidentiality
• Challenges
• Balancing confidentiality measures with usability is
critical. Strong encryption might hinder data
accessibility or system performance.
• Examples:
• Personal identifiable information (PII), financial
records, trade secrets, and classified government
information require strict confidentiality measures
to prevent unauthorized access or leaks
Integrity
• Definition
• Integrity ensures that information remains accurate, unaltered,
and reliable throughout its lifecycle.
• Methods
• Hash functions, digital signatures, checksums, and access controls
contribute to maintaining data integrity.
• Importance
• Guaranteeing that data is trustworthy and has not been tampered
with or modified in an unauthorized manner is essential for
making informed decisions and maintaining credibility.
• Methods
• Redundancy, disaster recovery plans, fault-tolerant systems, and
proper maintenance contribute to maintaining availability.
• Importance
• Uninterrupted access to information and systems is critical for
business continuity, productivity, and preventing disruptions
caused by cyber incidents or technical failures.
Availability
• Challenges
• Achieving high availability while defending against
various threats like DDoS attacks or system failures
requires a well-planned strategy.
• Examples
• E-commerce websites, critical infrastructure
systems, and online services rely on high
availability to serve users without interruptions.
Interrelationship and Trade-offs within the CIA
Triad
• Balancing Act
• Organizations must strike a balance between
confidentiality, integrity, and availability.
• Enhancing one aspect might sometimes affect the others.
• For instance, implementing robust encryption
(confidentiality) might slightly impact system performance
(availability).