0% found this document useful (0 votes)
18 views27 pages

Sec

The document discusses information security, including its definition, principles of confidentiality, integrity and availability, common threats like malware and social engineering, and differences from cybersecurity. It also covers security policies, encryption, and active vs passive attacks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views27 pages

Sec

The document discusses information security, including its definition, principles of confidentiality, integrity and availability, common threats like malware and social engineering, and differences from cybersecurity. It also covers security policies, encryption, and active vs passive attacks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 27

What is Information Security (InfoSec)?

• Information security (sometimes referred to as InfoSec) covers the


tools and processes that organizations use to protect information.
This includes policy settings that prevent unauthorized people from
accessing business or personal information. InfoSec is a growing and
evolving field that covers a wide range of fields, from network and
infrastructure security to testing and auditing.
• Information security protects sensitive information from unauthorized
activities, including inspection, modification, recording, and any
disruption or destruction. The goal is to ensure the safety and privacy
of critical data such as customer account details, financial data or
intellectual property.
• The consequences of security incidents include theft of private
information, data tampering, and data deletion. Attacks can disrupt
work processes and damage a company’s reputation, and also have a
tangible cost.

• Organizations must allocate funds for security and ensure that they
are ready to detect, respond to, and proactively prevent, attacks such
as phishing, malware, viruses, malicious insiders, and ransomware.
What are the 3 Principles of Information
Security?
• The basic tenets of information security are confidentiality, integrity
and availability. Every element of the information security program
must be designed to implement one or more of these principles.
Confidentiality
• Confidentiality measures are designed to prevent unauthorized
disclosure of information. The purpose of the confidentiality principle
is to keep personal information private and to ensure that it is visible
and accessible only to those individuals who own it or need it to
perform their organizational functions.
Integrity
• Consistency includes protection against unauthorized changes
(additions, deletions, alterations, etc.) to data. The principle of
integrity ensures that data is accurate and reliable and is not modified
incorrectly, whether accidentally or maliciously.
Availability
• Availability is the protection of a system’s ability to make software
systems and data fully available when a user needs it (or at a specified
time). The purpose of availability is to make the technology
infrastructure, the applications and the data available when they are
needed for an organizational process or for an organization’s
customers.
Information Security vs Cybersecurity
• Information security differs from cybersecurity in both scope and purpose.
The two terms are often used interchangeably, but more accurately,
cybersecurity is a subcategory of information security. Information security is
a broad field that covers many areas such as physical security, endpoint
security, data encryption, and network security. It is also closely related to
information assurance, which protects information from threats such as
natural disasters and server failures.

• Cybersecurity primarily addresses technology-related threats, with practices


and tools that can prevent or mitigate them. Another related category is data
security, which focuses on protecting an organization’s data from accidental
or malicious exposure to unauthorized parties.
Information Security Policy
• An Information Security Policy (ISP) is a set of rules that guide individuals
when using IT assets. Companies can create information security policies
to ensure that employees and other users follow security protocols and
procedures. Security policies are intended to ensure that only authorized
users can access sensitive systems and information.

• Creating an effective security policy and taking steps to ensure


compliance is an important step towards preventing and mitigating
security threats. To make your policy truly effective, update it frequently
based on company changes, new threats, conclusions drawn from
previous breaches, and changes to security systems and tools.
Top Information Security Threats
• There are hundreds of categories of information security threats and
millions of known threat vectors. Below we cover some of the key
threats that are a priority for security teams at modern enterprises.
Unsecure or Poorly Secured Systems
• The speed and technological development often leads to
compromises in security measures. In other cases, systems are
developed without security in mind, and remain in operation at an
organization as legacy systems. Organizations must identify these
poorly secured systems, and mitigate the threat by securing or
patching them, decommissioning them, or isolating them.
Social Media Attacks
• Many people have social media accounts, where they often
unintentionally share a lot of information about themselves. Attackers
can launch attacks directly via social media, for example by spreading
malware via social media messages, or indirectly, by using information
obtained from these sites to analyze user and organizational
vulnerabilities, and use them to design an attack.
Social Engineering
• Social engineering involves attackers sending emails and messages
that trick users into performing actions that may compromise their
security or divulge private information. Attackers manipulate users
using psychological triggers like curiosity, urgency or fear.

• Because the source of a social engineering message appears to be


trusted, people are more likely to comply, for example by clicking a
link that installs malware on their device, or by providing personal
information, credentials, or financial details.
• Organizations can mitigate social engineering by making users aware
of its dangers and training them to identify and avoid suspected social
engineering messages. In addition, technological systems can be used
to block social engineering at its source, or prevent users from
performing dangerous actions such as clicking on unknown links or
downloading unknown attachments.
Malware on Endpoints
• Organizational users work with a large variety of endpoint devices, including
desktop computers, laptops, tablets, and mobile phones, many of which are
privately owned and not under the organization’s control, and all of which
connect regularly to the Internet.

• A primary threat on all these endpoints is malware, which can be transmitted by a


variety of means, can result in compromise of the endpoint itself, and can also
lead to privilege escalation to other organizational systems.

• Traditional antivirus software is insufficient to block all modern forms of malware,


and more advanced approaches are developing to securing endpoints, such as
endpoint detection and response (EDR).
Lack of Encryption
• Encryption processes encode data so that it can only be decoded by
users with secret keys. It is very effective in preventing data loss or
corruption in case of equipment loss or theft, or in case organizational
systems are compromised by attackers.

• Unfortunately, this measure is often overlooked due to its complexity


and lack of legal obligations associated with proper implementation.
Organizations are increasingly adopting encryption, by purchasing
storage devices or using cloud services that support encryption, or
using dedicated security tools.
Security Misconfiguration
Modern organizations use a huge number of technological platforms and tools, in
particular web applications, databases, and Software as a Service (SaaS) applications, or
Infrastructure as a Service (IaaS) from providers like Amazon Web Services.

Enterprise grade platforms and cloud services have security features, but these must be
configured by the organization. Security misconfiguration due to negligence or human
error can result in a security breach. Another problem is “configuration drift”, where
correct security configuration can quickly become out of date and make a system
vulnerable, unbeknownst to IT or security staff.

Organizations can mitigate security misconfiguration using technological platforms that


continuously monitor systems, identify configuration gaps, and alert or even
automatically remediate configuration issues that make systems vulnerable.
Active vs Passive Attacks
• Information security is intended to protect organizations against
malicious attacks. There are two primary types of attacks: active and
passive. Active attacks are considered more difficult to prevent, and
the focus is on detecting, mitigating and recovering from them.
Passive attacks are easier to prevent with strong security measures.
Active Attack
An active attack involves intercepting a communication or message and altering
it for malicious effect. There are three common variants of an active attacks:

• Interruption—the attacker interrupts the original communication and creates


new, malicious messages, pretending to be one of the communicating parties.
• Modification—the attacker uses existing communications, and either replays
them to fool one of the communicating parties, or modifies them to gain an
advantage.
• Fabrication—creates fake, or synthetic, communications, typically with the
aim of achieving denial of service (DoS). This prevents users from accessing
systems or performing normal operations.
Passive Attack
• In a passive attack, an attacker monitors, monitors a system and
illicitly copies information without altering it. They then use this
information to disrupt networks or compromise target systems.

• The attackers do not make any change to the communication or the


target systems. This makes it more difficult to detect. However,
encryption can help prevent passive attacks because it obfuscates the
data, making it more difficult for attackers to make use of it.
Passive Attacks
Active Attacks

Modify messages, communications or Do not make any change to data or


data systems
Poses a threat to the availability and Poses a threat to the confidentiality of
integrity of sensitive data sensitive data.

May result in damage to organizational Does not directly cause damage to


systems. organizational systems.

Victims typically know about the attack Victims typically do not know about the
attack.
Main security focus is on detection and Main security focus is on prevention.
mitigation.

You might also like