Module 1-Intro To IA
Module 1-Intro To IA
Introduction to IA
MODULE 1
Introduction
Thought Experiment
Introduction
What is Information?
Information Assurance;
So what is “information”?
How does information differ
from data?
Introduction
What is Information?
Introduction
What is Information?
Introduction
What is Information Assurance?
Introduction
What is Information Assurance?
Introduction
What is IA? (cont)
According to the DoD definition, these are some aspects of
information needing protection:
Availability: timely, reliable access to data and information
services for authorized users;
Integrity: protection against unauthorized modification or
destruction of information;
Confidentiality: assurance that information is not disclosed to
unauthorized persons;
Authentication: security measures to establish the validity of a
transmission, message, or originator.
Non-repudiation: assurance that the sender is provided with proof of
a data delivery and recipient is provided with proof of
the sender’s identity, so that neither can later deny
having processed the data.
Is this specifically a military view? Which of these are the most
important? How would you decide?
Introduction
What is IA?
In these slides, are several different views of IA, including the DoD
view (above), Herrmann’s view (below), and Blyth and Kovacich’s
view (below). Be able to compare and contrast these views.
Introduction
A Different View of
IA
According to Debra Herrmann (Complete Guide to Security and
Privacy Metrics), IA should be viewed as spanning four security
engineering domains:
physical security
personnel security
IT security
operational security
Introduction
A Different View of
IA
Introduction
Four Security Domains
Introduction
Four Security Domains
“IT security is the inherent technical features and functions that collectively
contribute to an IT infrastructure achieving and sustaining confidentiality,
integrity, availability, accountability,
authenticity, and reliability.”
Introduction
Yet Another View: Components of IA
The third level focus of IA is the perceptual level, also called social engineering.
This is abstract and concerned with the management of perceptions of the target,
particularly those persons making
security decisions.
Desired Effects: to influence decisions and behaviors. Attacker’s
Operations: psychological operations such as:
deception, blackmail, bribery and corruption, social
engineering, trademark and copyright infringement,
defamation, diplomacy, creating distrust.
Defender’s Operations: personnel security including psychological testing,
education, and screening such as biometrics, watermarks, keys,
passwords.
Necessary for IW, as for any related activity, are motive, means,
and opportunity.
In general, the offensive players in the world of IW come in six
types:
Insiders: consists of employees, former employees and
contractors.
Hackers: one who gains unauthorized access to or breaks into
information systems for thrills, challenge, power, or
profit.
Criminals: target information that may be of value to them:
bank accounts, credit card information, intellectual
property, etc.
Capability restoration:
“relies on established procedures and mechanisms for
prioritizing restoration of essential functions. Capability
restoration may rely on backup or redundant links, information
system components, or alternative means of information
transfer.”
“A post-attack analysis should be conducted to determine the
command vulnerabilities and recommended security
improvements.”
Attack response: “involves determining actors and their
motives, establishing cause and complicity, and may involve
appropriate action against perpetrators... contributes ... by
removing threats and enhancing deterrence.”
2 Assess threats
Assess vulnerabilities
3
Assess risks
4 Prioritize countermeasure options
5 Make risk management decisions
E.g., buying insurance is risk transfer for you, not for the insurance
company. For the insurance company, it’s risk acceptance. But they
may require you to take measures to avoid or mitigate their risk.
Note the risk in this case is that your car will be broken into.