Module 01
Module 01
Introduction to Information
Security
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 1
Module Objectives
● During the Cold War, many more mainframe computers were brought online to
accomplish more complex and sophisticated tasks.
● The Advanced Research Projects Agency (ARPA) began to examine the
feasibility of a redundant networked communication system.
● Larry Roberts led the development of the ARPANET, which evolved into what
we now know as the Internet.
Development of the ARPANET
The 1970s and ’80s (1 of 2)
● Information security began with RAND Report R-609—the paper that started the
study of computer security and identified the role of management and policy
issues in it.
● The scope of computer security grew from physical security to include:
○ Securing the data
○ Limiting random and unauthorized access to data
○ Involving personnel from multiple levels of the organization in information
security
Computer Network Vulnerabilities
MULTICS
● Early research on computer security research centered on a system called
Multiplexed Information and Computing Service (MULTICS).
● The first operating system was created with security integrated into core
functions.
● Mainframe, time-sharing OS was developed in the mid-1960s by General
Electric (GE), Bell Labs, and Massachusetts Institute of Technology (MIT).
● Several MULTICS key players created UNIX.
○ The primary purpose of UNIX was text processing.
● Late 1970s: The microprocessor expanded computing capabilities and security
threats.
The 1990s
● Networks of computers became more common, as did the need to connect
them to each other.
● The Internet became the first global network of networks.
● Initially, network connections were based on de facto standards (those which
have been accepted as the best standard).
● In early Internet deployments, security was treated as a low priority.
● In the late 1990s and into the 2000s, many large corporations began publicly
integrating security into their organizations.
● Information security began to emerge as an independent discipline.
2000 to Present
● The Internet brings millions of unsecured computer networks and billions of
computer systems into continuous communication with each other.
● The ability to secure a computer’s data was influenced by the security of every
computer to which it is connected.
● The growing threat of cyber attacks has increased the awareness of need for
improved security.
● The threat environment has grown from the semi professional hacker defacing
Websites for amusement to professional cybercriminals maximizing revenue
from theft and extortion, as well as government-sponsored cyber war groups
striking military, government, and commercial targets.
Key Dates in Information Security (1 of 3)
Date Document
1968 Maurice Wilkes discusses password security in Time-Sharing Computer Systems.
1970 Willis H. Ware authors the report "Security Controls for Computer Systems: Report of Defense
Science Board Task Force on Computer Security-RAND Report R-609," which was not declassified
until 1979. It became known as the seminal work identifying the need for computer security.
1973 Schell, Downey, and Popek examine the need for additional security in military systems in
Preliminary Notes on the Design of Secure Military Computer Systems.
1975 The Federal Information Processing Standards (FIPS) examines DES (Digital Encryption Standard)
in the Federal Register.
1978 Bisbey and Hollingworth publish their study “Protection Analysis: Final Report," which discussed the
Protection Analysis project created by ARPA to better understand the vulnerabilities of operating
system security and examine the possibility of automated vulnerability detection techniques in
existing system software.
Key Dates in Information Security (2 of 3)
Date Document
1979 Morris and Thompson author “Password Security: A Case History," published in the Communications
of the Association for Computing Machinery (ACM). The paper examined the design history of a
password security scheme on a remotely accessed, time-sharing system.
Dennis Ritchie publishes “On the Security of UNIX" and "Protection of Data File Contents," which
discussed secure user IDs, secure group IDs, and the problems inherent in the systems.
1982 The U.S. Department of Defense Computer Security Evaluation Center publishes the first version of
the Trusted Computer Security (TCSEC) documents, which came to be known as the Rainbow
Series.
Key Dates in Information Security (3 of 3)
Date Document
1984 Grampp and Morris write “The UNIX System: UNIX Operating System Security." In this report, the
authors examined four "important handles to computer security": physical control of premises and
computer facilities, management commitment to security objectives, education of employees, and
administrative procedures aimed at increased security.
Reeds and Weinberger publish “File Security and the UNIX System Crypt Command." Their premise
was: “No technique can be secure against wiretapping or its equivalent on the computer. Therefore,
no technique can be secure against the system administrator or other privileged users . . . the naive
user has no chance.“
1992 Researchers for the Internet Engineering Task Force, working at the Naval Research Laboratory,
develop the Simple Internet Protocol Plus (SIPP) Security protocols, creating what is now known as
IPSEC security.
What Is Security?
● “A state of being secure and free from danger or harm; the actions taken to
make someone or something secure.”
● A successful organization should have multiple layers of security in place
to protect:
– Operations
– Physical Infrastructure
– People
– Functions
– Communications
– Information
Information Security
● InfoSec “The protection of information and its critical elements, including
systems and hardware that use, store, and transmit that information” (CNSS).
● InfoSec Includes information security management, data security, and network
security.
● C.I.A. triad (triplet) of confidentiality, integrity, and availability:
○ Is a standard based on confidentiality, integrity, and availability, now viewed
as inadequate.
○ Expanded model consists of a list of critical characteristics of information
Knowledge Check Activity 1
What is security?
a. Freedom from fear
b. Protection from loss
c. Keeping secrets
d. Being secure and free from danger
Knowledge Check Activity 1: Answer
What is security?
● An information system (IS) is the entire set of hardware, software data, people,
procedures, and networks that enable a business to use information.
● All of them work together to support personal and professional operations.
● Each one has its own strengths and weaknesses, as well as its own
characteristics and uses.
● Each one has its own security requirements.
Balancing Information Security and Access
What title is given to the person with primary responsibility for assessment,
management, and implementation of InfoSec in the organization?
a. CIO
b. CISO
c. CEO
d. CFO
Knowledge Check Activity 2: Answer
What title is given to the person with primary responsibility for assessment,
management, and implementation of InfoSec in the organization?
● The champion: A senior executive who promotes (sponsors) the project and
ensures its support, both financially and administratively, at the highest levels of
the organization.
● The team leader: A project manager, who may be a departmental line manager
or staff unit manager, who understands project management, personnel
management, and information security technical requirements.
● Security policy developers: Individuals who understand the organizational
culture, policies, and requirements for developing and implementing successful
policies.
Information Security Project Team
● Risk assessment specialists: People who understand financial risk
assessment techniques, the value of organizational assets, and the security
methods to be used.
● Security professionals: Dedicated, trained, and well-educated specialists in all
aspects of information security from both technical and nontechnical
standpoints.
● Systems administrators: People with the primary responsibility for
administering the systems that house the information used by the organization.
● End users: Those whom the new system will most directly impact. Ideally, a
selection of users from various departments, levels, and degrees of technical
knowledge assist the team in focusing on the application of realistic controls
applied in ways that do not disrupt the essential business activities they seek to
safeguard.
Data Responsibilities
● Data owners: senior management responsible for the security and use of a particular set of
information. The data owners work with subordinate managers to oversee the day-to-day
administration of the data.
● Data custodian: guardian responsible for information and systems that process, transmit, and
store it. Depending on the size of the organization, this may be a dedicated position, such as the
CISO, or it may be an additional responsibility of a systems administrator or other technology
manager. The duties of a data custodian often include overseeing data storage and backups,
implementing the specific procedures and policies laid out in the security policies and plans,
and reporting to the data owner.
Data Responsibilities
● The control and use of data in the organization is accomplished by the following
parties:
○ Data owners, who are responsible for the security and use of a particular set
of information
○ Data custodians, who are responsible for the storage, maintenance, and
protection of the information
○ Data trustees, who are appointed by data owners to oversee the
management of a particular set of information and to coordinate with data
custodians for its storage, protection, and use
○ Data users, who work with the information to perform their daily jobs and
support the mission of the organization
Summary (4 of 4)