CH 1
CH 1
OR
Information is that which informs i.e. that from which data can be derived.
OR
1. Data - It is a collection of all types of information which can be shared & used as per requirement.
Eg. Personal data
2. Knowledge - It is based on data that is organized & summarized. It is carried by experienced employee
in organization.
3. Action - It is used to pass the required information to a person who needs it with help of Information
System.
Information System- It is a set of interrelated components that collect process & distribute info to support
decision making in organization.
Now a day’s use of computer & communication technology has increased. So we need a system
that can manage the information or data.
Information is life blood of every organization.
An Information System includes hardware, software, data & application etc. to manage
information.
In organization it is needed to monitor different operations. Also used to document different
operations.
Information is useful or needed for ensuring smooth functioning of all the departments in
company.
Information benefits business world by allowing organizations to work more efficiently &
maximize productivity.
Data Information
data is used as input for the computer Information is the output of data.
system.
Data is unprocessed facts figures.. Information is processed data
Data doesn’t depend on Information. Information depends on data.
Data is not specific. Information is specific.
Data is a single unit. A group of data which carries news and
meaning is called Information.
Data doesn’t carry a meaning. Information must carry a logical meaning.
Data is the raw material Information is the product.
Types of Threats
1. Human error - an inappropriate or undesirable human decision or behavior that reduces or has
the potential for reducing, effectiveness, safety or system performance
3. Natural disaster or political disaster - a natural event such as a flood, earthquake, or hurricane that
causes great damage or loss of life, any war, Riots.
Types of Attacks
2. Logic bomb - a set of instructions secretly incorporated into a program so that if a particular
condition is satisfied they will be carried out, usually with harmful effects.
3. Computer virus - a piece of code which is capable of copying itself and typically has a
detrimental effect, such as corrupting the system or destroying data.
5. Spoofing - Spoofing is the creation of TCP/IP packets using somebody else's IP address
.
6. Sniffing - Packet sniffing allows individuals to capture data as it is transmitted over a network.
8. Salami Technique - unauthorized, covert process of taking small amounts (slices) of money or
otherwise numeric value from many sources in and with the aid of a computer.
Basic Principles of Information Security
Security-
Security means to protect information or system from unauthorized users like attacker.
OR
Security is the practice of protecting information from unauthorized access, use , inspection ,
recording , destruction.
OR
Information security is the process of protecting intellectual property of an organization.
Need of Security –
The purpose of information security management is to ensure business continuity & reduce business damage
by preventing & minimizing the impact of security incidents.
An information security management system enables information to be shared, ensuring the protection of
information & computing assets.
Information security is needed to protect the system from unauthorized access & modification.
When computer applications were developed to handle financial & personal data, the need for
security exists.
People realized that data on computers was extremely important.
Organizations employed their own mechanism in order to provide basic security mechanism. Eg.
User id & password for every user.
As technology improved people realized that the basic security measures were not quite enough.
Then internet took the world by storm & there were any examples of what could happen if there was
insufficient security built in applications.
Hence we need security for –
a.) Protecting resources of organizations.
b.) To avoid business damage.
c.) To avoid unauthorized user to access important information.
d.) To protect personal data.
e.) To protect sensitive information of organization.
f.) Help to protect intellectual property.
Goals of Security
Information security is more than just computer security. It also includes wide range of physical security
means. E.g. protecting assets from natural disasters or thefts.
System Security
Data security
H/W and S/W security
Application Security
server room access control
Physical security
Security Layers
2. Non repudiation - Nonrepudiation is the assurance that someone cannot deny something.
Typically, nonrepudiation refers to the ability to ensure that a party to a contract or a
communication cannot deny the authenticity of their signature on a document or the sending of a
message that they originated.
4. Encryption - Encryption is the conversion of data into a form, called a cipher text that cannot be
easily understood by unauthorized people.
6. Decryption - Decryption is the process of converting encrypted data back into its original form,
so it can be understood.
8. Steganography - the practice of concealing messages or information within other non-secret text
or data.
9. Spoofing - Spoofing is the creation of TCP/IP packets using somebody else's IP address
1.) Confidentiality -
It means making sure that information is only seen by people who have the rights to see it.
Confidentiality refers to limiting information access and disclosure to authorized users -- "the right
people" -- and preventing access by or disclosure to unauthorized ones -- "the wrong people."
Authentication methods like user-IDs and passwords, that uniquely identify data systems' users and
control access to data systems' resources, underpin the goal of confidentiality
2.) Integrity-
It means ensuring that information remains unaltered. This means watching out for alterations
through malicious action or even simple innocent mistake.
Integrity refers to the trustworthiness of information resources.
Only authorized individual can create or change information.
It includes the concept of "data integrity" -- namely, that data have not been changed inappropriately,
whether by accident or deliberately malign activity. It also includes "origin" or "source integrity" --
that is, that the data actually came from the person or entity you think it did, rather than an imposter.
3.) Availability-
It implies having access to your information when you need it. Availability refers, unsurprisingly, to
the availability of information resources. An information system that is not available when you need
it is almost as bad as none at all. It may be much worse, depending on how reliant the organization
has become on a functioning computer and communications infrastructure.
Information Classification
Organization will classify information to provide information security.
The main reason for classifying information is that all data or information of organization will
not have same level of criticality.
Some information may be important & some may not be important.
Aim of an organization is to improve confidentiality, integrity & availability (CIA) of
information to reduce risk related to information.
Information classification is important while securing any trusted system like government
sectors.
Information classification is used to prevent unauthorized access to a system
Due to privacy laws or any other compliances information may be classified.
Due to information classification organization can employ security policies.
Classification Levels-
1.) Value –
Common criteria for classification.
Valuable information of organization should be classified.
Eg.in college student list is classified according to their department.
2.) Age-
In this information is classified according to time period.
Eg. Certain information is valid only for certain period so after the period is over that
information is not useful.
3.) Useful Life –
If validity or deadline of information is over due to changes in information then that
information must be declassified.
Eg. Our earlier diploma scheme was E scheme & now current scheme is G. So information is
classified accordingly.
4.) Personal Association-
Information which is personally associated with particular individual then such information
should be classified.
5.) Public-
Information is classified on this factor also.
Public information is not sensitive.
If it is accessed by unauthorized user it will not affect the security.
Eg. Information given on website of any organization.
6.) Private-
Important information of organization can be kept separately.
Unauthorized user cannot access it.
Eg. Information related to project going on in organization is kept secret from other
organization.
Data Obfuscation (DO)
Data Obfuscation (DO) is a form of data masking where data is purposely scrambled to
prevent unauthorized access to sensitive material.
This form of encryption results in unintelligible or confusing data.
DO is also called as data scrambling or privacy preservation.
DO is a technique used to prevent intrusion of private & sensitive online data.
DO is related to encryption of data & it is the solution to information theft because it hides
original information with random characters.
It is related to hiding the data so that it cannot be found.
The use of personal information in government records, medical records& voter’s list etc.
will create threat to privacy. Hence many countries are focusing on safeguards for privacy of
personal information.
It is necessary for organization to understand the risk & need of protection in terms of
privacy to the publicized information.
Hence the term data obfuscation is used which modifies the data items without changing the
usefulness of the data.
Data Obfuscation techniques-
a) Substitution
b) Shuffling
c) Number & data variance
d) Encryption
e) Deletion
f) Masking out
Data obfuscation techniques can be classified by number of criteria –
a) Usefulness
b) Effectiveness
c) Cost
d) Resiliency
A good example of DO is audit report on medical system. In this report only required field of
patients are disclosed to the auditor. Details which are not required such as patient’s contact
number ,address are obfuscated.
Event Classification-
There are several types of events by which information is damaged.
1. Viruses-
Viruses can either copy themselves directly into executable files or can infect files that are
opened or processed by the target executable (e.g. Pdf document)
Viruses use a variety of infection mechanisms to replicate into new hosts & perform many
different types of actions.
2. Disaster-
An event that causes permanent & substantial damage or destruction to the property,
equipment information, staff or services of the business.
3. Crisis-
An abnormal situation that presents some extraordinary high risks to a business & that will
develop into a disaster unless carefully managed.
4. Catastrophe-
Major disruptions resulting from the destruction of critical equipment in processing.