Information Assurance and Security
Information Assurance and Security
ISO STANDARD
ISO/IEC Standard 9126-1 (Software Engineering—Product Quality), the following are all
aspects of system quality:
● functionality
○ adequacy
○ interoperability
○ correctness
○ security
● reliability
● usability
● efficiency
● maintainability
● Portability
Examples:
Into which of these would you put the following?
● enforcing hard-to-guess passwords -
● encrypting your hard drive -
● locking sensitive documents in a safe -
● stationing a marine guard outside an embassy -
● assigning security clearances to staffers -
● using SSL for data transfers -
● having off-site backup of documents -
Physical Security - refers to the protection of hardware, software, and data against physical
threats
Personnel Security - as the result of action or inaction by insiders and known outsiders
IT Security - is the inherent technical features and functions that collectively contribute to an
IT infrastructure
Operational Security - involves the implementation of standard operational security
procedures that define the nature and frequency of the interaction between users, systems,
and system resources, the purpose of which is to
1. achieve and sustain a known secure system state at all times, and;
2. prevent accidental or intentional theft, release, destruction, alteration, misuse, or
sabotage of system resources.
Desired Effects: to affect the technical performance and the capability of physical systems,
to disrupt the capabilities of the defender.
Attacker’s Operations: physical attack and destruction, including: electromagnetic attack,
visual spying, intrusion, scavenging and removal, wiretapping, interference, and
eavesdropping.
Defender’s Operations: physical security, OPSEC, TEMPEST.
Perceptual level
- third level focus of IA
- also called social engineering
- concerned with the management of perceptions of the target, particularly those
persons making security decisions.
Asset
- is the resource being protected
Examples of Threats
Interruption: an asset becomes unusable, unavailable, or lost.
Interception: an unauthorized party gains access to an information asset.
Modification: an unauthorized party tampers with an asset.
Fabrication: an asset has been counterfeit.
Examples:
Interruption: a denial of service attack on a website
Interception: compromise of confidential data, e.g., but packet sniffing
Modification: hacking to deface a website
Fabrication: spoofing attacks in a network