Lecture 01 02
Lecture 01 02
Lecture 02 & 03
Delivered By: Dr.Ahthasham Sajid
Dated: 2nd September 2024
Email: [email protected]
Agenda
• Course Overview
• Course Objectives
• Difference between Data, Wisdom and Knowledge
• What is Information Security?
• Need of Information Security
• History of Information Security
• Why We Use Information Security
Course Overview
• This course consists of Information security and their related concepts are
covered such as confidentiality, integrity, and availability along with various types
of security threats, vulnerability, and attacks. Furthermore, this course also
covered the cryptographic techniques and their concepts.
Textbooks
• William Stallings, Network Security
Essentials, 2/E
• One or two chapters from CNS3e
4
Course Objectives
• Students will learn to analyze the networks threats, which may allow an attacker
to compromise the security of an information system.
• Information can be anything like Your details or we can say your profile on social
media, your data on mobile phone, your biometrics etc. Thus Information
Security spans so many research areas like Cryptography, Mobile Computing,
Cyber Forensics, Online Social Media, etc.
History of Information Security
• During 1st World War, Multi-tier Classification System was developed keeping in
mind the sensitivity of the information. With the beginning of 2nd World War,
formal alignment of the Classification System was done. Alan Turing was the one
who successfully decrypted Enigma Machine which was used by Germans to
encrypt warfare data.
Why we use Information
Security?
• Here are some key reasons why information security is important:
• Protecting Sensitive Information: Information security helps protect sensitive
information from being accessed, disclosed, or modified by unauthorized individuals.
This includes personal information, financial data, and trade secrets, as well as
confidential government and military information.
• Mitigating Risk: By implementing information security measures, organizations can
mitigate the risks associated with cyber threats and other security incidents. This
includes minimizing the risk of data breaches, denial-of-service attacks, and other
malicious activities.
• Compliance with Regulations: Many industries and jurisdictions have specific regulations
governing the protection of sensitive information. Information security measures help
ensure compliance with these regulations, reducing the risk of fines and legal liability.
• Protecting Reputation: Security breaches can damage an organization’s reputation and lead
to lost business. Effective information security can help protect an organization’s reputation
by minimizing the risk of security incidents.
• Ensuring Business Continuity: Information security helps ensure that critical business
functions can continue even in the event of a security incident. This includes maintaining
access to key systems and data, and minimizing the impact of any disruptions.
Critical Characteristics of
Information
Confidentiality
Privacy
Authentication
Authorization
Utility (useful)
Integrity
Identification
Accountability (Audit Logs)
Possession (Ownership)
Availability
Accuracy
10/21/2024
CIA Triangle
• Confidentiality makes sure that only authorized personnel are given access or
permission to modify data.
• Availability means that the authorized users should be able to access data
whenever required.
10/21/2024
CIA Model
10/21/2024
Identification
10/21/2024
Authentication
• Authentication occurs when a control provides proof that a user possesses the
identity that he or she claims.
10/21/2024
Authorization
10/21/2024
Accountability
10/21/2024
Accuracy
• Information should have accuracy. Information has accuracy when it is free from
mistakes or errors and it has the value that the end users expects. If information
contains a value different from the user’s expectations, due to the intentional or
unintentional modification of its content, it is no longer accurate.
10/21/2024
Issues of Information Security :
• Cyber Threats: The increasing sophistication of cyber attacks, including malware, phishing,
and Ransomware, makes it difficult to protect information systems and the information they
store.
• Human Error: People can inadvertently put information at risk through actions such as losing
laptops or smartphones, clicking on malicious links, or using weak passwords.
• Insider Threats: Employees with access to sensitive information can pose a risk if they
intentionally or unintentionally cause harm to the organization.
• Legacy Systems: Older information systems may not have the security features of newer
systems, making them more vulnerable to attack.
10/21/2024
• Complexity: The increasing complexity of information systems and the information they store makes it
difficult to secure them effectively.
• Mobile and IoT devices: The growing number of mobile devices and internet of things (IoT) devices
creates new security challenges as they can be easily lost or stolen, and may have weak security controls.
• Integration with third-party systems: Integrating information systems with third-party systems can
introduce new security risks, as the third-party systems may have security vulnerabilities.
• Data Privacy: Protecting personal and sensitive information from unauthorized access, use, or disclosure
• Globalization: The increasing globalization of business makes it more difficult to secure information, as
data may be stored, processed, and transmitted across multiple countries with different security
requirements.
10/21/2024
Intellectual property
10/21/2024
10/21/2024
Ethical issues in Information Security
• Access Rights
• Prevention of Loss
• Patents
• Copyrights
• Trade Secret
• Piracy
10/21/2024
10/21/2024
10/21/2024
10/21/2024
Access Rights
• Access right becomes a high priority issue for the IT and cyberspace with the
great advancement in technology.
10/21/2024
Component of Access Control
10/21/2024
10/21/2024
10/21/2024
10/21/2024
Privacy
• when, and to what extent, information about oneself can be communicated to others.
• Personal information, such as where one lives, where they work, or how many children they
have.
• Information about one's possessions, such as if one owns their home or how much their
house is worth.
10/21/2024
Patent
• A patent can preserve the unique and secret aspect of an idea. Obtaining a patent is very difficult
as compared with obtaining a copyright.
• A thorough disclosure is required with the software. The patent holder has to reveal the full
details of a program to a proficient programmer for building a program.
10/21/2024
10/21/2024
10/21/2024
10/21/2024
Copyright
10/21/2024
10/21/2024
10/21/2024
Trade Secret
10/21/2024
10/21/2024
10/21/2024
Piracy
10/21/2024
10/21/2024
10/21/2024
10/21/2024
Legal issues in Information Security
• Information technology organizations are also bound to follow laws issued by the
Government. If a company fails to provide satisfactory service to the client or
cheats the client, the organization is held guilty in court.
10/21/2024
Violation of Contracts:
• When a client or organization decides to work with each other, the details are
finalized by creating a contract. The contract contains the work duration, the
purpose of the work, and other details related to the project. Before getting the
client on board, it is necessary to discuss the contract and get all the details
approved by the client.
• Later, if the client or the organization violates the contract, they may face legal
issues. Either party can file an issue in court and get the conflict solved according to
the computer acts defined by the Government.
10/21/2024
Negligence of Contracts: