BIS 321 Chapter One Part One
BIS 321 Chapter One Part One
Part One
Information Security
(BIS 321)
Introduction
While computer systems today have some of the best security
Internal External
attacker attacker
6
Contd.
1. Prevention:- is the foundation of the security trinity.
To provide some level of security, it is necessary to implement
measures to prevent the exploitation of vulnerabilities.
In developing network security schemes, organizations should
emphasize preventative measures over detection and response.
It is easier, more efficient, and much more cost-effective to
prevent a security breach than to detect or respond to one.
2. Detection:- Once preventative measures are implemented,
procedures need to be put in place to detect potential
problems or security breaches, in the event preventative
measures fail.
7 The sooner a problem is detected the easier it is to correct and cleanup.
Contd.
8
Network Security In Action
NETWORK
Client
DNS Network Services FTP/Telnet SMTP/POP Web Server
Configuration
VULNERABILITAS
IP & Port Web Server Sniffing KeyStroke Password
Email Exploit DoS Attack Trojan Attack MITM Attack
Scanning Exploit Traffic Logging Cracking
PREVENT
Hardening AntiVirus Using Using Using
Using SSH Using IPSec
Host Applications Firewall GPG/PGP Certificate
DETECTION
Intrusion Spyware
System Log Backup and Finding
Detection HoneyPot Detection and
Analysis Restore Hidden Data
System Removal
9
Information Security
Network security is concerned, above all else, with the security of
information assets.
Information security means protecting information and information
systems from unauthorized access, use, disclosure, disruption,
modification, perusal, inspection, recording or destruction.
Information security = confidentiality + integrity +
availability + authentication.
The terms information security, computer security and information
assurance are frequently incorrectly used interchangeably.
These fields are interrelated often and share the common goals of
protecting the confidentiality, integrity and availability of information;
however, there are some subtle differences between them.
10
Contd.
Information security is concerned with the confidentiality,
integrity and availability of data regardless of the form the
data may take: electronic, print, or other forms.
Computer security can focus on ensuring the availability
and correct operation of a computer system without concern
for the information stored or processed by the computer.
Information security offers many areas for specialization
including: securing network(s) and allied infrastructure,
securing applications and databases, security testing,
information systems auditing, business continuity
11
planning and digital forensics science, etc
Definitions
organizational assets.
14
Something you are
Contd.
3. Access Control(Authorization):- refers to the ability to control
the level of access that individuals or entities have to a network
or system and how much information they can receive.
Your level of authorization basically determines what you're
allowed to do once you are authenticated and allowed access
to a network, system, or some other resource such as data or
information.
Access control is the determination of the level of
authorization to a system, network, or information (i.e.,
15
classified, secret, or top-secret).
Contd.
attacks (DOS).
16
Contd.
6. Data Integrity:- refers to the assurance of data received
are exactly as sent by an authorized entity.
Data integrity is achieved by preventing unauthorized or
improper changes to data, ensuring internal and external
consistency, and ensuring that other data attributes (such as
timeliness and completeness) are consistent with requirements.
is crucial to e-commerce.
18