Information Security
Information Security
Definition
Information Security
• Information is an important part of an
organization or a business that requires
more attention to preserve its Integrity,
Privacy and Availability
• Information security refers to the protection
of information,
• It is the process of securing ,protecting and
safeguarding your information from
unauthorized access, use and modification.
What is Information Security?
Information Security
Information security is the process of protecting
information from unauthorized access, use,
disclosure, destruction, modification, or disruption
The protection of computer systems and information
from harm, theft, and unauthorized use.
Protecting the confidentiality, integrity and
availability of information
Information security is an essential infrastructure
technology to achieve successful information-based
society
Highly information-based company without
information security will lose competitiveness 3
Goals of Information Security?
– security attack
– security service
Security Attack
• Any action that compromises the security of
information owned by an organization
• Information security is about how to prevent
attacks, or failing that, to detect attacks on
information-based systems
• often threat & attack used to mean same thing
• have a wide range of attacks
• can focus of generic types of attacks
– passive
– active
Security Attack
Passive Attacks
Passive Attack
• Passive attacks are in the nature of
eavesdropping on, or monitoring of,
transmissions.
• The goal of the opponent is to obtain
information that is being transmitted. Two
types of passive attacks are release of
message contents and traffic analysis.
Passive Attacks
Passive Attacks
1. Release of message contents
The release of message contents is easily understood . A
telephone conversation, an electronic mail message, and
a transferred file may contain sensitive or confidential
information.
2. Traffic Analysis
The opponent could determine the location and identity of
communicating hosts and could observe the frequency
and length of messages being exchanged. This
information might be useful in guessing the nature of the
communication that was taking place.
Active Attacks
Active Attacks
• Active attacks involve some modification
of the data stream or the creation of a
false stream and can be subdivided into
four categories: masquerade, replay,
modification of messages, and denial of
service.
Active Attacks
Active Attacks
1. Masquerade
A masquerade takes place when one entity pretends to be a
different entity .
For example, authentication sequences can be captured and
replayed after a valid authentication sequence has taken
place, thus enabling an authorized entity with few
privileges to obtain extra privileges by impersonating an
entity that has those privileges.
2. Replay
involves the passive capture of a data unit and its
subsequent retransmission to produce an unauthorized
effect
Active Attacks
Active Attacks
3. Modification of messages
It simply means that some portion of a
legitimate message is altered, or that
messages are delayed or reordered, to
produce an unauthorized effect
4. The denial of service
prevents or inhibits the normal use or
management of communications facilities
Security Service