0% found this document useful (0 votes)
56 views

Introduction To Information Security

The document introduces basic security concepts like the CIA triad of confidentiality, integrity and availability. It outlines assessing security risks through a 5-step process including analyzing resources and business concerns. An effective security policy communicates a vision, represents requirements, and is flexible. It includes physical, user, system, network and audit controls. Certifications and web resources help security professionals stay informed.

Uploaded by

sara.naseem
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
56 views

Introduction To Information Security

The document introduces basic security concepts like the CIA triad of confidentiality, integrity and availability. It outlines assessing security risks through a 5-step process including analyzing resources and business concerns. An effective security policy communicates a vision, represents requirements, and is flexible. It includes physical, user, system, network and audit controls. Certifications and web resources help security professionals stay informed.

Uploaded by

sara.naseem
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 24

Introduction to Information

Security

1
Objectives

In this lecture, you will:

• Define basic security concepts


• Begin to assess security risks
• Outline a security policy
• Locate information security resources

2
Basic Security Concepts
• information security – perception
• information security – reality
• CIA (Confidentiality , Data integrity and
Availability) triad
• PPP (physical security, privacy, and marketplace
security ) triad

3
Basic Security Concepts

• Confidentiality – only
authorized individuals
can access data
CIA
Tirade
• Integrity – data changes
are tracked and properly
controlled
PPP
Tirade • Availability – systems
are accessible for
business needs

4
Assessing Risks
Assessment can be performed using a five-step process

• Check existing security policies and processes

• Analyze, prioritize, and categorize resources

• Consider business concerns

• Evaluate existing security controls

• Leverage existing management and control architecture

5
Assessing Risk

• Check existing security policies and processes

• Analyze, prioritize, and categorize resources by determining:


total cost of ownership, internal value, and external value.
– TCO refers to the total monetary and labor costs
calculated over a specific time period
– Internal value refers to the monetary assessment of the
importance of a particular asset to the internal working of
a company
– External value refers to the money or another commodity
that the asset brings to the company from external
sources

6
Assessing Risk

• Consider business concerns through the


annualized loss expectancy (ALE = SLE * ARO)
– Single loss expectancy (SLE) is equal to the
asset’s value times the exposure factor (EF)
• Asset value = TCO + internal value + external value
• EF is the percentage of asset loss that is expected
from a particular threat
– Annualized rate of occurrence (ARO) is the
estimated frequency with which a particular threat
may occur each year

7
Assessing Risk

• Evaluate existing security controls to determine


what controls are deployed and effective
• Leverage existing management and control
architecture to build a persuasive business case
for, or against, implementing new security
controls

8
Security policy

At a minimum, an organization’s security policy should cover


the following:

• Physical security

• Access Control

• Network security

• System security

• Authorized security tools

• Auditing procedures 9
Benefits of a Security Policy

• A security policy has the following three important


benefits:

• Communicates a common vision for security throughout


a company

• Represents a single easy-to-use source of security


requirements

• Exists as a flexible document that should be updated at


least annually to address new security threats

10
Inputs for a security policy
• Local laws, regulations and business contracts

• Internal business goals, principles and guidelines

• Security measures deemed essential through risk


assessment

11
Building a Security Policy
An organization’s security policy should cover
the following:
• Foreword: Purpose, scope, responsibilities, and
penalties for noncompliance
• Physical security: Controls to protect the people,
equipment, facilities, and computer assets
• User ID and rights management: Only authorized
individuals have access to the necessary
systems and network devices

12
Building a Security Policy Cont.

An organization’s security policy should cover


the following:
• Network security: Protect the network devices
and data in transit
• System security: Necessary defenses to protect
computer systems from compromise
• Testing: Authorized security tools and testing
• Auditing: Procedures to periodically check
security compliance

13
Building a Security Policy
Foreword

• Purpose: Why is this policy being established?


• Scope: What people, systems, software,
information, and facilities are covered?
• Responsibilities: Who is responsible for the
various computing roles in a company?
• Compliance: What are the penalties for
noncompliance? Which organization is
responsible for auditing compliance?

14
Building a Security Policy
Physical Security

• Human threats: theft, vandalism, sabotage, and


terrorism
• Building damage: fire, water damage, and toxic
leaks
• Natural disasters: floods, hurricanes, and
tornadoes
• Infrastructure disruption: loss of power, loss of
HVAC, and downed communication lines
• Equipment failure: computer system damage and
network device failure
15
Building a Security Policy
User ID and Rights Management

Authentication:
• Authentication model
• Implementation technologies
• Implementation mechanism

Access Controls - determine who gets what access


to what
• Access control model
• Implementation mechanism

16
Building a Security Policy
Network Security
• Specific timeframes for changing passwords on
the network devices

• Use of secure network protocols

• Firewalls at specific chokepoints in a network


architecture

• Use of authentication servers to access network


devices

17
Building a Security Policy
System Security
• The systems section is used to outline the
specific settings required to secure a particular
operating system or application
– For example, for Windows NT 4.0, it may be a
requirement that every logical drive be installed
with NTFS
– For a particular UNIX flavor, shadow password files
may be required to hide user IDs and passwords
from general users

18
Building a Security Policy
Testing and Auditing
• Specify requirements for vulnerability scanners,
compliance checking tools, and other security
tools run within the environment

• Require auditing logs on specific devices,


periodic self-audits performed by the system
administrators, and the use of security
compliance checking tools

• Specify corporate auditing requirements,


frequencies, and organizations
19
Security Resources
Security Certifications
• CISSP
• SSCP
• GIAC
• CISA
• CIW Security Professional

20
Security Resources
Web Resources

21
Summary
• The CIA triad categorizes aspects of information that
must be protected from attacks: confidentiality,
integrity, and availability.

• The PPP triad depicts security, privacy, and


marketplace perception as three additional abstract
concepts that should drive security efforts.

22
Summary Cont.
• The first step in creating an effective security policy is to perform
a risk assessment within the environment. A risk assessment
consists of five steps:
– Check for existing security policies and processes
– Analyze, prioritize, and categorize resources
– Consider business concerns
– Evaluate existing security controls
– Leverage existing management and control architecture
• To estimate potential financial loss from security threats, the
following formula works well by accounting for the most important
cost factors associated with security: ALE = SLE * ARO.
• A security policy has three major benefits. It:
– Communicates a common vision for security throughout a
company
– Represents a single easy-to-use source of security
requirements
– Exists as a flexible document that should be updated at least
annually to address new security threats
23
Summary Cont.
• An effective security policy includes security requirements in the
following areas:
– Physical security
– User ID and rights management
– Systems
– Network
– Security tools
– Auditing
• There are a number of security-related certifications to help
security professionals quantify their knowledge on a resume.
• Every security professional must stay current about the latest
threats through Web resources, mailing lists, and printed
materials.

24

You might also like