IAS Module 1
IAS Module 1
COMPILATION LECTURES
IN
SECURITY (APC – 4)
___________________________
BSIT-III
Submitted to:
This module presents fundamentals of information security where the students will learn about
the key information security concepts such as confidentiality, integrity, availability and other
opponents of a typical information system including software, hardware, data, people, etc.
Moreover, different types of malicious software (malware) will be presented including viruses,
worms, logic bombs, Trojan horses, and back doors and will discuss various security threats and
attacks including software attacks, forces of nature and equipment malfunction.
Learning Outcomes:
Learning Content:
Information security is a “well-informed sense of assurance that the information risks and
controls are in balance.” —Jim Anderson, Inovant (2002)
The need for computer security, or the need to secure the physical location of hardware from
outside threats, began almost immediately after the first mainframes were developed. Groups
developing code-breaking computations during World War II created the first modern
computers. Badges, keys, and facial recognition of authorized personnel controlled access to
sensitive military locations. In contrast, information security during these early years was
rudimentary and mainly composed of simple document classification schemes.
There were no application classification projects for computers or operating systems at this time,
because the primary threats to security were physical theft of equipment, espionage against the
products of the systems, and sabotage.
What is information?
According to Blyth and Kovacich, p. 17, “Information is data endowed with relevance and
purpose. Converting data into information thus requires knowledge. Knowledge by definition is
specialized.” And the characteristics should information possess to be useful are the following:
accurate,
➢ timely,
➢ complete,
➢ verifiable,
➢ consistent,
➢ available.
According to Raggad (pp. 14ff), the following are all distinct conceptual resources:
It is the study of how to protect your information assets from destruction, degradation,
manipulation and exploitation.
It also refers to a “Measures that protect and defend information and information systems by
ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. These
measures include providing for restoration of information systems by incorporating
protection, detection, and reaction capabilities.” According to the U.S. Department of Defense,
✓ Actions taken that protect and defend information and information systems by ensuring their
availability, integrity, authentication, confidentiality and non- repudiation. This includes
providing for restoration of information systems by incorporating protection, detection and
reaction capabilities.
According to the DoD definition, these are some aspects of information needing protection:
Availability: timely, reliable access to data and information services for authorized users;
Integrity: protection against unauthorized modification or destruction of information;
Confidentiality: assurance that information is not disclosed to unauthorized persons;
Authentication: security measures to establish the validity of a transmission, message, or
originator.
Non-repudiation: assurance
that the sender is provided
with proof of a data delivery
and recipient
is provided with proof of the
sender’s identity, so that
neither can later deny
having processed
the data.
Non-repudiation: assurance that the sender is provided with proof of a data delivery and
recipient is provided with proof of the sender’s identity, so that neither can later deny having
processed the data.
Thinking Box:
Which of the aspects of
information needing
protection are the most
important?
How would you decide?
Thinking Box:
Which of the aspects of information needing protection are the most important?
How would you decide?
Thinking Box:
Which of the aspects of information needing protection are the most important?
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
Security: An Overview
______________________________________________________________________________
______________________________________________________________________________
This module presents
______________________________________________________________________________
______________________________________________________________________________
fundamentals of
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
about the
______________________________________________________________________________
Thinking Box:
Into which of these would you put the following domain or categories?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
__________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
__________________________________________________________________________________
_______________________________________________________________________________________
Four Security Domains
According to Debra
Herrmann, Complete Guide
to Security and Privacy
Metrics:
The Physical The lowest level focus of IA is the physical level which
consists of computers, physical networks, telecommunications and
supporting systems such as power, facilities and environmental controls.
Also at this level are the people who manage the systems.
Desired Effects: to affect the technical performance and the capability
of physical systems, to disrupt the capabilities of the defender.
Attacker’s Operations: physical attack and destruction, including:
electromagnetic attack, visual spying, intrusion, scavenging and removal,
wiretapping, interference, and eavesdropping.
Defender’s Operations: physical security, OPSEC, TEMPEST.
Thinking Box:
Is there overlap among these categories of nature of the treat? Which do you think is the
biggest threat?
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
Assets
An asset is the resource being protected, including:
a. physical assets- these are devices, computers, people;
b. logical assets - these are information, data (in transmission, storage,
or processing), and intellectual property;
c. system assets- it refers to any software, hardware, data,
administrative, physical, communications, or personnel resource within an
information system.
Subjects and Objects
Often a security solution/policy is phrased in terms of the following three
categories:
a. Objects: these are stems being protected by the system (documents,
files, directories, databases, transactions, etc.)
b. Subjects: are entities (users, processes, etc.) that execute activities
and request access to objects.
c. Actions: these are operations, primitive or complex, that can operate
on objects and must be controlled.
For example, in the Unix operating system, processes (subjects) may have
permission to perform read, write or execute (actions) on files (objects). In
addition, processes can create other processes, create and delete files, etc.
Certain processes (running with root permission) can do almost anything.
That is one approach to the security problem.
Thinking Box:
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
_________________________________________________________________________________
D. C.
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
E.
_________________________________________________________________________________
F. Information Assurance
Levels: Perceptual
G. The third level focus of
IA is the perceptual level,
also called social
engineering. This is
abstract
H. and concerned with
the management of
perceptions of the
target, particularly those
persons making
I. security decisions.
J. Desired Effects: to
influence decisions and
behaviors.
K.
L. Attacker’s Operations:
psychological operations
such as: deception,
blackmail, bribery and
M. corruption, social
engineering, trademark
and copyright
infringement, defamation,
diplomacy,
N. creating distrust.
O. Defender’s Operations:
personnel security
including psychological
testing, education, and
P.screening such as
biometrics, watermarks,
keys, passwords
Critical Aspects
Information assets (objects) may have critical aspects such as:
a. availability: authorized users are able to access it;
b. accuracy: the information is free of error and has the value expected;
c. authenticity: the information is genuine;
d. confidentiality: the information has not been disclosed to unauthorized
parties;
e. integrity: the information is whole, complete and uncorrupted;
f. utility: the information has value for the intended purpose;
g. possession: the data is under authorized ownership and control.
Thinking Box:
Can you give examples of these or situations in which they might occur?
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
_________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
_________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
_________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
Attacks
An attack is an attempt to gain access, cause damage to or otherwise
compromise information and/or systems that support it.
a. Passive attack: an attack in which the attacker observes interaction with
the system.
b. Active attack: at attack in which the attacker directly interacts with the
system.
c. Unintentional attack: an attack where there is not a deliberate goal of
misuse
Thinking Box:
Mention some ways in
which the attack surface
Exposure, Compromise
can be reduced
Exposure is an instance when the system is vulnerable to attack. A
compromise is a situation in which the attacker has succeeded. An
indicator is a recognized action— specific, generalized or theoretical—
that an adversary (threat actor) might be expected to take in preparation for
an attack.
Consequences
A consequence is the outcome of an attack. In a purposeful threat, the
threat
actor has typically chosen a desired consequence for the attack, and selects
the IA objective to target to achieve this.
Countermeasures
Controls, safeguards and countermeasures are any actions, devices,
procedures, techniques and other measures that reduce the vulnerability of
an information system.
There are many kinds:
- technical
- policy, procedures and practices
- education, training and awareness
- cover and deception (camouflage)
- human intelligence (HUMINT), e.g. disinformation
- monitoring of data and transmissions
- surveillance countermeasures that detect or neutralize sensors, e.g.
TEMPEST
- assessments and inspections.