Ch1. Information Security - Introdction 1 1
Ch1. Information Security - Introdction 1 1
Jumana Khwaileh-LTUC
Topics…
Information security
What is information security?
The information security triad.
Security risks.
Security mechanisms.
Security concepts.
Learning Objectives
It’s the application of measures to ensure the safety and privacy of data by managing its
storage and distribution. Information security has both technical and social implications
Information security is the process of the protecting the data from unauthorized
access, disclosure, destruction or disruption.
Personal Information Security
Simple steps that individuals can take to be more secure:
Keep your software up to date
Threats
Vulnerabilities
Consequences
Security risks
Risks to information can be assessed by identifying different types of possible
attack that can be attempted.
These attacks are often classified by the type of action that an attacker is able to
perform.
Passive Attacks
Active Attacks
Security risks
Passive attacks
• The main type of passive attack is unauthorized access to data. This is a passive
process in the sense that the data and the processes being conducted on that data
remain unaffected by the attack.
• Note that a passive attack is often likened to ‘stealing’ information. However, unlike
stealing physical goods, in most cases theft of data still leaves the owner in possession
of that data.
• As a result, information theft may go unnoticed by the owner. Indeed, it may even be
undetectable.
Security risks
Active attacks
• An active attack involves either data being changed in some way, or a process
being conducted on the data.
• Examples of active attacks include:
• Unauthorized alteration of data
• Unauthorized deletion of data
• Unauthorized transmission of data
• Unauthorized tampering with the origin of data
• Unauthorized prevention of access to data (denial of service).
Passive Attacks and Active Attacks
Information Security & Cryptography
Information security involves the use of many
different types of security technologies, as well as
management processes and controls.
As we shall see, cryptography lies at the heart of most technical information security
mechanisms.
Once largely the domain of government and the military, cryptography is now deployed
on devices that can be found in the pockets of almost every consumer of technology.
Security Goals
An organization needs to guard against those malicious actions that endanger the
confidentiality of its information.
Encryption services can protect your data at rest or in transit and prevent unauthorized
access to protected data.
Integrity
• Integrity means that changes need to be done only by authorized entities and
information.
C I
S
A
ATTACKS
• The three goals of security¾confidentiality, integrity, and availability¾can be
threatened by security attacks.
• Modification means that the attacker intercepts the message and changes it.
else.
• Replaying means the attacker obtains a copy of a message sent by a user and later
• Complementary practices:
• UPS systems
• Backup processing sites
Firewalls
• Can be a piece of hardware and/or software
• Hardware firewalls are connected to the network.
• Software firewalls run on the operating system and intercepts packets as they arrive to a
computer.
• Can implement multiple firewalls to allow segments of the network to be partially secured
to conduct business.
• Intrusion Detection Systems (IDS) watch for specific types of activities to alert security
personnel of potential network attack.
Virtual Private Networks (VPN)
• Some systems can be made private using an internal network to limit access to them
• Can’t be accessed remotely and are more secure
• Requires specific connections such as being onsite
• VPN allows users to remotely access these systems over a public network like the Internet
• Bypasses the firewall
• Encrypts the communication or the data exchanged