InfoSec Intro Final 2
InfoSec Intro Final 2
Security
LAV GUPTA
ASSISTANT PROFESSOR/CS
0
Introduction to information security
• The protection of information and its critical elements, including systems and
hardware that process, use, store, and transmit that information (Committee on National
Security Systems)
• How? Of course, you have legal, accepted methods to do your job.
1
Information System
• Information system (IS) is the entire set of people, procedures, and technology that
enable business to use information.
People
Data Processes
Information
System
Hardware Networks
Software
4
Information Security Models
6
McCumber Cube
Security Measures
Source: Pearson
7
Defense-in-Depth Security Model
Source: Infocyte
Defense in depth is a concept used in Information security in which multiple layers
of security controls (defense) are placed throughout an information system.
8
The Bell-LaPadula Model
• Used for access control and confidentiality. Based on state machine. System move
from state to state, Avoid falling into an insecure state. Used in DoD
Source: Skillset
9
The Biba Model
10
Brewer and Nash Model
11
Next… The value of information
12