Unit 1
Unit 1
J
Subject Name and Code : CW3551- Data and Information security
Branch & Department : B.Tech CSBS
Year & Semester : IV / VII
Academic Year : 2024-2025(Odd)
5 WEB SECURITY
TOTAL:45 PERIODS
REFERENCE:
1. Allen B. Downey, “Think Stats: Exploratory Data Analysis in Python”, Green Tea Press,2014.
of data.
integrity of data and stop online threats like hacking and data breaches.
•The need for computer security that is, the need to secure physical locations,
hardware, and software from threats arose during World War II when the first
mainframes, developed to aid computations for communication code breaking were
put to use.
•Multiple levels of security were implemented to protect these mainframes and
maintain the integrity of their data.
•Access to sensitive military locations, for example, was controlled by means of
badges, keys, and the facial recognition of authorized personnel by security guards.
CW3551 / DIS / KITE 9
CW3551 / DIS / KITE 10
The 1960s
• During the Cold War, many more mainframes were brought online to accomplish more
complex and sophisticated tasks.
• It became necessary to enable these mainframes to communicate via a less cumbersome
process than mailing magnetic tapes between computer centers.
•In response to this need, the Department of Defense’s Advanced Research Project Agency
(ARPA) began examining the feasibility of a redundant, networked communications system
to support the military’s exchange of information.
•Larry Roberts, known as the founder of the Internet, developed the project—which was
called ARPANET—from its inception.
• During the next decade, ARPANET became popular and more widely used, and the
potential for its misuse grew.
• Because of the range and frequency of computer security violations and the explosion
in the numbers of hosts and users on ARPANET, network security was referred to as
network insecurity
• In 1978, a famous study entitled “Protection Analysis: Final Report” was
published. It focused on a project undertaken by ARPA to discover the vulnerabilities
of Operating System security.
• In 1967, systems were being acquired at a rapid rate and securing them was a
pressing concern for both the military and defense contractors.
• In mid-1969, not long after the restructuring of the MULTICS project, created a
new
Communication
lines Switching
Processor
center
Hardware
Files Improper connections
Theft Cross coupling
Operator
Copying Systems Programmer Remote
Replace supervisor
Unauthorized access Disable protective features Consoles
Reveal protective measures
Provide “ins”
Hardware Reveal protective measures
Failure of protection circuits
Maintenance Man Access
contribute to software failures
Disable hardware devices Attachment of recorders
Software Use stand-alone utility programs Bugs User
Failure of protection features Identification
Access control Authentication
Bounds control Subtle software
etc. modifications
1.Availability
2.Accuracy
3.Authenticity
-Spoofing
-Phishing
4.Confidentiality
5.Integrity
6.Utility
7.Possession
23-07-2024 CW35551/DIS/III CSBS/V-SEM/KG-KITE 3
1.Availability
• Authorized only users have access to information when and where needed as well as
the data needs to in the correct format
• Free from errors with the value the end user expects.
• Sending an e-mail with a modified field such as the address from the
sender
1. Computer Hardware
2. Computer Software
3. Databases
4. Network
5. Human Resources
6.Procedures
• An Information system is a combination of hardware and
software and telecommunication networks that people build to
collect, create and distribute useful data, typically in an
organization.
o The hardware structure depends upon the type and size of the
organization.
• System Software
• Application Software
• Procedures
3. Databases:
o Data are the raw facts and figures that are unorganized that are
later processed to generate information.
o Softwares are used for organizing and serving data to the user,
managing physical storage of media and virtual resources.
o It is associated with the manpower required to run and manage the system.
o People are the end user of the information system, end-user use information
produced for their own purpose, the main purpose of the information system
is to benefit the end user.
information on a connection.
Stage 5: Testing
Stage 6: Deployment
Stage 7: Maintenance
CW3551/ DIS/ KITE 8
Stage1: Planning and requirement analysis:
Planning:
• Business Requirements
• Stakeholder Requirements
• Solution Requirements
-- Functional Requirements
-- Non-Functional Requirements
• Enterprise Analysis
• Elicitation
• Requirements Analysis
• Once when the client starts using the developed systems, then
the real issues come up and requirements to be solved from
time to time.
1. Planning
2. Analysis
3. Design
4. Implementation
5. Maintenance
6. Retirement
1. Planning:
requirements specification.
3. Design:
of the organization.
6.Retirement:
• Eventually, the security system will reach the end of its useful
properly preserved.
• Phases involved in SecSDLC are:
1. System Investigation
2. System Analysis
3. Logical Design
4. Physical Design
5. Implementation
6. Maintenance
1. System Investigation:
• The technical teams acquire the tools and blueprints needed for
the implementation of the software and application of the
system security.