Lecture 1
Lecture 1
Information
Security
INF 203
Content
• Course content
• What is Information security?
• CIA Security Triad
• Attacks
• Threats, vulnerabilities, and risk
Course description
Discover the core principles and practices of Information
Security in this comprehensive course. Gain insights into
cybersecurity threats, learn to design secure systems, and
understand network security essentials. Delve into
cryptography, security policies, and incident response
strategies. This course combines theory with hands-on
exercises, making it ideal for IT professionals and those looking
to bolster their security knowledge. Enroll now to navigate the
digital landscape with confidence and safeguard valuable
information
Instructors:
3 - 15 1 - 40
Quiz Final exam
Personnel security, to
Physical security, to
protect the individual or Operations security, to
protect physical items,
group of individuals who protect the details of a
objects, or areas from
are authorized to access particular operation or
unauthorized access and
the organization and its series of activities
misuse
operations
1. Pure information
CIA triad
Availability
Integrity
Confidentiality is a concept
similar to, but not the same as,
privacy. Confidentiality is a
necessary component of privacy
and refers to our ability to protect
our data from those who are not
authorized to view it.
Confidentiality is a concept that
may be implemented at many
levels of a process.
Integrity refers to the ability to prevent our data from
being changed in an unauthorized or undesirable
manner. This could mean the unauthorized change
or deletion of our data or portions of our data, or it
could mean an authorized, but undesirable, change
or deletion of our data. To maintain integrity, we not
only need to have the means to prevent
unauthorized changes to our data but also need the
ability to reverse authorized changes that need to be
undone.
• Availability refers to the ability
to access our data when we
need it. Loss of availability can
refer to a wide variety of breaks
anywhere in the chain that
allows us access to our data.
Such issues can result from
power loss, operating system or
application problems, network
attacks, compromise of a
system, or other problems.
When such issues are caused
by an outside party, such as an
attacker, they are commonly
referred to as a denial of
service (DoS) attack.
Confidentiality
Integrity
Availability
Accountability
Accuracy
the Authenticity
best-known Awareness
attributes of Completeness
security Consistency
Control
Democracy
Ethics
Legality
Defense Models
Attacks
•Attack: An intentional or
unintentional act that can
cause damage to or
otherwise compromise
information and/or the
systems that support it.
Types of attack payloads
Interception Interruption Modification Fabrication
• Interception attacks allow •Interruption attacks cause our assets •Modification attacks involve •Fabrication attacks involve generating
unauthorized users to access our data, to become unusable or unavailable for tampering with our asset. Such data, processes, communications, or
applications, or environments, and are our use, on a temporary or permanent attacks might primarily be considered other similar activities with a system.
primarily an attack against basis. Interruption attacks often affect an integrity attack but could also Fabrication attacks primarily affect
confidentiality. Interception might availability but can be an attack on represent an availability attack. If we integrity but could be considered an
take the form of unauthorized file integrity as well. In the case of a DoS access a file in an unauthorized availability attack as well. If we
viewing or copying, eavesdropping on attack on a mail server, we would manner and alter the data it contains, generate spurious information in a
phone conversations, or reading classify this as an availability attack. In we have affected the integrity of the database, this would be considered to
e-mail, and can be conducted against the case of an attacker manipulating data contained in the file. However, if be a fabrication attack. We could also
data at rest or in motion. Properly the processes on which a database we consider the case where the file in generate e-mail, which is commonly
executed, interception attacks can be runs in order to prevent access to the question is a configuration file that called spoofing. This can be used as a
very difficult to detect. data it contains, we might consider manages how a particular service method for propagating malware,
this an integrity attack, due to the behaves, perhaps one that is acting as such as we might find being used to
possible loss or corruption of data, or a Web server, we might affect the spread a worm. In the sense of an
we might consider it a combination of availability of that service by changing availability attack, if we generate
the two. We might also consider such the contents of the file. If we continue enough additional processes, network
a database attack to be a modification with this concept and say the traffic, e-mail, Web traffic, or nearly
attack rather than an interruption configuration we altered in the file for anything else that consumes
attack. our Web server is one that alters how resources, we can potentially render
the server deals with encrypted the service that handles such traffic
connections, we could even make this unavailable to legitimate users of the
a confidentiality attack. system.
Threats, vulnerabilities, and risk
Threats When we spoke of the types of attacks we might encounter, we discussed some of the things that have the
potential to cause harm to our assets. Ultimately, this is what a threat is—something that has the potential to cause us
harm. Threats tend to be specific to certain environments, particularly in the world of information security. For
example, although a virus might pose a threat to a Windows operating system, the same virus will be unlikely to have
any effect on a Linux operating system.
Vulnerabilities Vulnerabilities are weaknesses that can be used to harm us. In essence, they are holes that can be
exploited by threats in order to cause us harm. A vulnerability might be a specific operating system or application that
we are running, a physical location where we have chosen to place our office building, a data center that is populated
over the capacity of its air-conditioning system, a lack of backup generators, or other factors.
Risk Risk is the likelihood that something bad will happen. In order for us to have a risk in a particular environment, we
need to have both a threat and a vulnerability that the specific threat can exploit. For example, if we have a structure
that is made from wood and we set it on fire, we have both a threat (the fire) and a vulnerability that matches it (the
wood structure). In this case, we most definitely have a risk.