0% found this document useful (0 votes)
18 views

Lecture1 Introduction

Uploaded by

asmm.rahaman
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views

Lecture1 Introduction

Uploaded by

asmm.rahaman
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 45

First Meet

MISS 1101: Introduction to Information Security

Instructor
Abu Sayed Md. Mostafizur Rahaman, PhD
Professor
Department of Computer Science and Engineering
Jahangirnagar University
Textbooks

Sixth Edition
2 Introduction to Information Security, Abu Sayed Md. Mostafizur Rahaman, PhD
Google class
• Class code: kimny67

• It contains
– Lecture Materials
– Schedule Updates
– Additional resources
– Etc

3 Introduction to Information Security, Abu Sayed Md. Mostafizur Rahaman, PhD


Topics Covered Throughout the Course

Module 5 Incident Module 6 Legal, Ethical,


Module 1 Introduction to Module 2 The Need for Module 3 Information Module 4 Risk
Response and and Professional Issues in
Information Security Information Security Security Management Management
Contingency Planning Information Security

Module 9 Security
Module 8 Security
Technology: Intrusion
Module 7 Security and Technology: Access Module 11 Implementing Module 12 Information
Detection and Prevention Module 10 Cryptography
Personnel Controls, Firewalls, and Information Security Security Maintenance
Systems and Other Security
VPNs
Tools

4 Introduction to Information Security, Abu Sayed Md. Mostafizur Rahaman, PhD


In course Exam Schedule
Week (According to
Description Remarks
Academic Calendar)
CT 01 Week 4
CT 02 Week 07 Group Submission for Presentation
through
Group Distribution for Presentation Week 08
CT 03 Week 11
CT 04 Week 16
Presentation 01 Week 16
Presentation 02 Week 17

5 Introduction to Information Security, Abu Sayed Md. Mostafizur Rahaman, PhD


Lecture 1: Information Security

Discuss the history of computer


security and explain how it
Define information security
evolved into information
security

Define key terms and critical Describe the information


concepts of information security roles of professionals
security within an organization

6 Introduction to Information Security, Abu Sayed Md. Mostafizur Rahaman, PhD


The History of Information Security

Groups developing code-breaking computations during


Computer security began immediately after World War II created the first modern computers.
the first mainframes were developed Multiple levels of security were implemented.

Physical controls limiting access to sensitive military locations to authorized personnel

Primarily in defending against physical theft, espionage, and sabotage

7 Introduction to Information Security, Abu Sayed Md. Mostafizur Rahaman, PhD


Table 1-1 Key Dates in Information Security (1 of 2)

Date Document

1968 Maurice Wilkes discusses password security in Time - Sharing Computer Systems.

1970 Willis H. Ware author the report Security Controls for Computer Systems: Report of Defense Science Board
Task Force on Computer Security—RAND R.609 which was not declassified until 1979. It became known as
the seminal work identifying the need for computer Security.

1973 Schell, Downey, and Popek examine the need for additional security in military systems in Preliminary Notes
on the Design of Secure Military Computer Systems.
1975 The Federal Information Processing Standards (FIPS) examines DES (Digital Encryption Standard) In the
Federal Register.
1978 Bisbey and Hollingsworth publish their study “Protection Analysis: Final Report,” which discussed the
Protection Analysis project created by ARPA to better understand the vulnerabilities of operating system
security and examine the possibility of automated vulnerability detection techniques in existing system
software.

8 Introduction to Information Security, Abu Sayed Md. Mostafizur Rahaman, PhD


Table 1-1 Key Dates in Information Security (2 of 2)
Date Document

1979 Dennis Ritchie publishes “On the Security of UNIX” and “Protection of Data File Contents,” which discussed secure user IDs,
secure group IDs, and the problems inherent in the systems.

1982 The US. Department of Defense Computer Security Evaluation Center published the first version of the Trusted Computer Security
(TCSEC) documents, which came to be known as the Rainbow Series.

1982 Grampp and Morris write “The UNIX System: UNIX Operating System Security.” In this report the authors examined four
“important handles to computer security”: physical control of primes and computer facilities, management commitment to security
objectives, education of employees, and administrative procedures aimed at increased security.

1984 Reeds and Weinberger publish “File Security and the UNIX System Crypt Command.” Their premise was: “No technique can be
secure against wiretapping or is equivalent on the computer. Therefore no technique can be secure against the system administrator
or other privileged users... the naive user have no chance.”
1992 Researchers for the Internet Engineering Task force, working at the Naval Research Laboratory, develop the Simple Internet
Protocol Plus (SIPP) Security protocols, creating what is now known as IPSEC security.

9 Introduction to Information Security, Abu Sayed Md. Mostafizur Rahaman, PhD


Figure 1-4 Illustration of computer network vulnerabilities from RAND Report
R-609

10 Introduction to Information Security, Abu Sayed Md. Mostafizur Rahaman, PhD


2000 to Present

• The Internet brings millions of unsecured computer networks into


continuous communication with each other.
• The ability to secure a computer’s data was influenced by the security of
every computer to which it is connected.
• Growing threat of cyber attacks has increased the awareness of need for
improved security.
– Nation-states engaging in information warfare

11 Introduction to Information Security, Abu Sayed Md. Mostafizur Rahaman, PhD


What Is Security? (1 of 2)
• “A state of being secure and free from danger or harm; the actions taken to make
someone or something secure.”
• A successful organization should have multiple layers of security in place to protect:
– Operations
– Physical infrastructure
– People
– Functions
– Communications
– Information

12 Introduction to Information Security, Abu Sayed Md. Mostafizur Rahaman, PhD


What Is Security? (2 of 2)
• Information Security: The protection of information and its critical elements, including
systems and hardware that use, store, and transmit that information
– Includes information security management, data security, and network security
• C.I.A. triad
– Is a standard based on confidentiality, integrity, and availability, now viewed as inadequate.
– Expanded model consists of a list of critical characteristics of information.

13 Introduction to Information Security, Abu Sayed Md. Mostafizur Rahaman, PhD


Figure 1-5 Components of information security (1 of 2)

14 Introduction to Information Security, Abu Sayed Md. Mostafizur Rahaman, PhD


Figure 1-5 The C.I.A. triad (2 of 2)

15 Introduction to Information Security, Abu Sayed Md. Mostafizur Rahaman, PhD


Key Information of Security Concepts (1 of 2)

Control, safeguard,
Access Asset Attack
or countermeasure

Protection profile or
Exploit Exposure Loss
security posture

16 Introduction to Information Security, Abu Sayed Md. Mostafizur Rahaman, PhD


Key Information of Security Concepts (2 of 2)

Subjects and
Risk objects of Threat Threat agent
attack

Threat event Threat source Vulnerability

17 Introduction to Information Security, Abu Sayed Md. Mostafizur Rahaman, PhD


Critical Characteristics of Information

• The value of information comes from the characteristics it possesses:


• Availability: enables authorized users—people or computer systems—to access information without interference or
obstruction and to receive it in the required format.
• Accuracy: Free from mistake or error and having the value that the end user expects
• Authenticity: The quality or state of being genuine or original, rather than a reproduction or fabrication
• Confidentiality: ensures that only users with the rights, privileges, and need to access information can do so.
• Integrity: when it is in its expected state and can be trusted
• Utility: Information has value when it serves a particular purpose. This means that if information is
available, but not in a format meaningful to the end user, it is not useful.
• Possession: Information is said to be in possession if one obtains it, independent of format or another
characteristic. While a breach of confidentiality always results in a breach of possession, a breach of
possession does not always result in a breach of confidentiality.

18 Introduction to Information Security, Abu Sayed Md. Mostafizur Rahaman, PhD


CNSS Security Model

The McCumber Cube

19 Introduction to Information Security, Abu Sayed Md. Mostafizur Rahaman, PhD


Components of an Information System

• Information system (IS) is the entire set of people, procedures, and


technology that enable business to use information.
– Software
– Hardware
– Data
– People
– Procedures
– Networks

20 Introduction to Information Security, Abu Sayed Md. Mostafizur Rahaman, PhD


Security And The Organization
• Security has to begin somewhere in the organization, and it takes a wide range of professionals to support
a diverse information security program.
• The following sections discuss the development of security as a program and then describe typical
information security responsibilities of various professional roles in an organization.
– Balancing Information Security and Access
– Approaches to Information Security Implementation
– Security Professionals
– Data Responsibilities
– Communities of Interest

21 Introduction to Information Security, Abu Sayed Md. Mostafizur Rahaman, PhD


Balancing Information Security and Access

Impossible to obtain perfect information security—it is a process, not a goal.

Security should be considered a balance between protection and availability.

To achieve balance, the level of security must allow reasonable access, yet
protect against threats.

22 Introduction to Information Security, Abu Sayed Md. Mostafizur Rahaman, PhD


Approaches to Information Security Implementation: Bottom-Up
Approach

Grassroots effort: Systems administrators attempt to improve security of


their systems.

Key advantage: technical expertise of individual administrators

Seldom works, as it lacks a number of Participant support


critical features: Organizational staying power

23 Introduction to Information Security, Abu Sayed Md. Mostafizur Rahaman, PhD


Approaches to Information Security Implementation: Top-Down
Approach

Issue policy, procedures, and processes


Initiated by upper management Dictate goals and expected outcomes of project
Determine accountability for each required action

The most successful type of top-down approach also involves a formal


development strategy referred to as systems development life cycle.

24 Introduction to Information Security, Abu Sayed Md. Mostafizur Rahaman, PhD


Figure 1-12 Approaches to information security
implementation

25 Introduction to Information Security, Abu Sayed Md. Mostafizur Rahaman, PhD


Security in the Systems Development Life Cycle

Systems development life cycle (SDLC): a methodology for the design and
implementation of an information system

Methodology: a formal approach to solving a problem based on a structured


sequence of procedures

Ensures a rigorous process with a clearly defined


Using a methodology: goal
Increases probability of success

26 Introduction to Information Security, Abu Sayed Md. Mostafizur Rahaman, PhD


Figure 1-13 SDLC waterfall methodology

27 Introduction to Information Security, Abu Sayed Md. Mostafizur Rahaman, PhD


Investigation

What problem is the system being developed to solve?

Objectives, constraints, and scope of project are specified.

Preliminary cost-benefit analysis is developed.

At the end of all phases, a process is undertaken to assess economic, technical, and behavioral feasibilities
and ensure implementation is worth the time and effort.

28 Introduction to Information Security, Abu Sayed Md. Mostafizur Rahaman, PhD


Analysis

The organization
Consists of assessments of: Current systems
Capability to support proposed systems

Analysts determine what the new system is expected to do and how it will
interact with existing systems.

Analysis ends with documentation of findings and an update of feasibility.

29 Introduction to Information Security, Abu Sayed Md. Mostafizur Rahaman, PhD


Logical Design

The first and driving factor is the business need. Applications are selected to provide needed services.

Data support and structures capable of providing the needed inputs are identified.

Specific technologies are delineated to implement the physical solution.

Analysts generate estimates of costs and benefits to allow comparison of available options.

Feasibility analysis is performed at the end.

30 Introduction to Information Security, Abu Sayed Md. Mostafizur Rahaman, PhD


Physical Design

Specific technologies are selected to support the alternatives identified and evaluated in the
logical design.

Selected components are evaluated on make-or-buy decision.

Feasibility analysis is performed.

Entire solution is presented to organization’s management for approval.

31 Introduction to Information Security, Abu Sayed Md. Mostafizur Rahaman, PhD


Implementation

Needed software is created.

Components are ordered, received, and tested.

Users are trained and supporting documentation created.

Sponsors are presented with the system for a


Feasibility analysis is prepared. performance review and acceptance test.

32 Introduction to Information Security, Abu Sayed Md. Mostafizur Rahaman, PhD


Maintenance and Change

Longest and most expensive phase

Consists of the tasks necessary to support and modify the system for the remainder of its
useful life

Life cycle continues until the team determines the process should begin again from the
investigation phase

When current system can no longer support the organization’s mission, a new project is
implemented

33 Introduction to Information Security, Abu Sayed Md. Mostafizur Rahaman, PhD


Software Assurance (1 of 3)

Many organizations recognize the need to include


Established procedures to create software that is more capable
planning for security objectives in the SDLC used to of being deployed in a secure fashion
create systems.

This approach is known as software assurance (SA).

A national effort is under way to create a common body of knowledge focused on secure software
development.

34 Introduction to Information Security, Abu Sayed Md. Mostafizur Rahaman, PhD


Software Assurance (2 of 3)

U.S. Department of Defense and Department of Homeland Security supported the Software
Assurance Initiative, which resulted in the publication of Secure Software Assurance (SwA)
Common Body of Knowledge (CBK).

SwA CBK serves as a strongly recommended guide to developing more secure applications.

Nature of Dangers
SwA CBK, which is a work in progress, contains Fundamental Concepts and Principles
the following sections: Ethics, Law, and Governance

35 Introduction to Information Security, Abu Sayed Md. Mostafizur Rahaman, PhD


Software Assurance (3 of 3)

– Secure Software Requirements


– Secure Software Design
– Secure Software Construction
– Secure Software Verification, Validation, and Evaluation
– Secure Software Tools and Methods
– Secure Software Processes
– Secure Software Project Management
– Acquisition of Secure Software
– Secure Software Sustainment

36 Introduction to Information Security, Abu Sayed Md. Mostafizur Rahaman, PhD


Security Professionals and the Organization

Wide range of professionals are required to support a diverse


information security program.

Senior management is the key component.

Additional administrative support and technical expertise are required to


implement details of the IS program.

37 Introduction to Information Security, Abu Sayed Md. Mostafizur Rahaman, PhD


Senior Management

Chief information officer (CIO)

• Senior technology officer


• Primarily responsible for advising the senior executives on strategic
planning

Chief information security officer (CISO)

• Has primary responsibility for assessment, management, and


implementation of IS in the organization
• Usually reports directly to the CIO

38 Introduction to Information Security, Abu Sayed Md. Mostafizur Rahaman, PhD


Information Security Project Team

• A small functional team of people who are experienced in one or multiple


facets of required technical and nontechnical areas:
– Champion
– Team leader
– Security policy developers
– Risk assessment specialists
– Security professionals
– Systems administrators
– End users

39 Introduction to Information Security, Abu Sayed Md. Mostafizur Rahaman, PhD


Data Responsibilities

Data owners: senior management responsible for the security and use of a particular set of
information

Data custodians: responsible for the information and systems that process, transmit, and
store it

Data trustees: are individuals appointed by data owners to oversee the management of a particular set of
information and to coordinate with data custodians for its storage, protection, and use

Data users: individuals with an information security role

40 Introduction to Information Security, Abu Sayed Md. Mostafizur Rahaman, PhD


Communities of Interest

• Group of individuals united by similar interests/values within an


organization
– Information security management and professionals
– Information technology management and professionals
– Organizational management and professionals

41 Introduction to Information Security, Abu Sayed Md. Mostafizur Rahaman, PhD


Information Security: Is It an Art or a Science?

Implementation of information security is often described as a combination


of art and science.

“Security artisan” idea: based on the way individuals perceive system


technologists and their abilities.

42 Introduction to Information Security, Abu Sayed Md. Mostafizur Rahaman, PhD


Security as Art

No hard and fast rules nor many


universally accepted complete solutions

No manual for implementing security


through entire system

43 Introduction to Information Security, Abu Sayed Md. Mostafizur Rahaman, PhD


Security as Science

Dealing with technology designed for rigorous performance levels.

Specific conditions cause virtually all actions in computer systems.

Almost every fault, security hole, and systems malfunction is a result of interaction of
specific hardware and software.

If developers had sufficient time, they could resolve and eliminate faults.

44 Introduction to Information Security, Abu Sayed Md. Mostafizur Rahaman, PhD


Security as a Social Science

Social science examines the behavior of individuals interacting with


systems.

Security begins and ends with the people that interact with the
system, intentionally or otherwise.

Security administrators can greatly reduce the levels of risk caused by


end users and create more acceptable and supportable security
profiles.
45 Introduction to Information Security, Abu Sayed Md. Mostafizur Rahaman, PhD

You might also like