Lecture 1 - Introduction
Lecture 1 - Introduction
INTRODUCTION
LEARNING OUTCOMES
To define nature and value of information
To explain security issues, information
security and information assurance
To identify disaster recovery and forensics
To discuss Information assurance analysis
model (MSR model; threats; vulnerabilities;
attacks; countermeasures)
Source: Principles of Information Security
Michael E. Whitman; Herbert J. Mattord
COMPONENTS OF
INFORMATION SECURITY
2. Find every file on the computer system, including files that are encrypted,
protected by passwords, hidden or deleted, but not yet overwritten.
Investigators should make a copy of all the files on the system. This includes files
on the computer's hard drive or in other storage devices. Since accessing a file
can alter it, it's important that investigators only work from copies of files while
searching for evidence. The original system should remain preserved and intact.
4. Reveal the contents of all hidden files with programs designed to detect the
presence of hidden data.
Phases Of Computer Forensics
5. Decrypt and access protected files.
6. Analyze special areas of the computer's disks, including parts that are normally
inaccessible. (In computer terms, unused space on a computer's drive is called
unallocated space. That space could contain files or parts of files that are
relevant to the case.).
7. Document every step of the procedure. It's important for detectives to provide
proof that their investigations preserved all the information on the computer
system without changing or damaging it. Years can pass between an investigation
and a trial, and without proper documentation, evidence may not be admissible.
Robbins says that the documentation should include not only all the files and
data recovered from the system, but also a report on the system's physical layout
and whether any files had encryption or were otherwise hidden.
.whether it is authentic -2
if it is hearsay -3
https://www.geeksforgeeks.org/information-assurance-model-in-
cyber-security/
INFORMATION ASSURANCE MODEL
3)Security Countermeasures
Consists of FOUR (4) Dimensions: This dimension has functionalities to save
system from immediate vulnerability by
accounting for technology, policy &
1) Information States practice, and people.
Information is referred to as interpretation
of data which can be found in three states 4)Time
stored, processed, or transmitted. This dimension can be viewed in many
ways. At any given time data may be
available offline or online, information and
system might be in flux thus, introducing
2) Security Services risk of unauthorized access. Therefore, in
It is fundamental pillar of the model which every phase of System Development
provides security to system and consists Cycle, every aspect of Information
of five services namely availability, Assurance model must be well defined
integrity, confidentiality, authentication, and and well implemented in order to minimize
non-repudiation. risk of unauthorized access.
https://www.geeksforgeeks.org/information-assurance-model-in-
cyber-security/
INFORMATION STATE )1
Transmission
.It defines time wherein data is between processing steps
Example :
In transit over networks when user sends email to reader, including memory
.and storage encountered during delivery
Storage
.It defines time during which data is saved on medium such as hard drive
.Example: Saving document on file server’s disk by user
Processing
.It defines time during which data is in processing state
Example :
.Data is processed in random access memory (RAM) of workstation
https://www.geeksforgeeks.org/information-assurance-model-in-
cyber-security/
SECURITY SERVICES )2
Confidentiality Integrity
It assures that information of system is not It ensures that sensitive data is accurate and
disclosed to unauthorized access and is read and trustworthy and can not be created, changed, or
interpreted only by persons authorized to do so. deleted without proper authorization.
Protection of confidentiality prevents malicious Maintaining integrity involves modification or
access and accidental disclosure of information. destruction of information by unauthorized
Information that is considered to be confidential access. To ensure integrity backups should be
is called as sensitive information. To ensure planned and implemented in order to restore any
confidentiality data is categorized into different affected data in case of security breach. Besides
categories according to damage severity and this cryptographic checksum can also be used for
.then accordingly strict measures are taken .verification of data
Example :
Protecting email content to read by only desired Example :
set of users. This can be insured by data Implementation of measures to verify that e-mail
encryption. Two-factor authentication, strong content was not modified in transit. This can be
passwords, security tokens, and biometric achieved by using cryptography which will ensure
verification are some popular norms for that intended user receives correct and accurate
.authentication users to access sensitive data .information
https://www.geeksforgeeks.org/information-assurance-model-in-
cyber-security/
SECURITY SERVICES )2
Availability
It guarantees reliable and constant access to sensitive data only by authorized users. It involves
measures to sustain access to data in spite of system failures and sources of interference. To ensure
availability of corrupted data must be eliminated, recovery time must be speed up and physical
.infrastructure must be improved
Example :
.Accessing and throughput of e-mail service
Authentication
It is security service that is designed to establish validity of transmission of message by verification of
individual’s identity to receive specific category of information. To ensure availability of various single
factors and multi-factor authentication methods are used. A single factor authentication method uses
single parameter to verify users’ identity whereas two-factor authentication uses multiple factors to
.verify user’s identity
Example :
Entering username and password when we log in to website is example of authentication. Entering
correct login information lets website verify our identity and ensures that only we access sensitive
.information
https://www.geeksforgeeks.org/information-assurance-model-in-
cyber-security/
SECURITY SERVICES )2
Non-Repudiation
It is mechanism to ensure sender or receiver cannot deny fact that they are part of
data transmission. When sender sends data to receiver, it receives delivery
confirmation. When receiver receives message it has all information attached within
.message regarding sender
Example :
A common example is sending SMS from one mobile phone to another. After message
is received confirmation message is displayed that receiver has received message. In
.return, message received by receiver contains all information about sender
https://www.geeksforgeeks.org/information-assurance-model-in-
cyber-security/
SECURITY COUNTERMEASURES )3
People
People are heart of information system. Administrators and users of information
systems must follow policies and practice for designing good system. They
must be informed regularly regarding information system and ready to act
appropriately to safeguard system.
Technology
Appropriate technology such as firewalls, routers, and intrusion detection
must be used in order to defend system from vulnerabilities, threats.
The technology used must facilitate quick response whenever information
security gets compromised.
https://www.geeksforgeeks.org/information-assurance-model-in-
cyber-security/
SUMMARY
:You have learnt
Nature and value of information-
Security issues, information security and-
information assurance
Disaster recovery and forensics-
Information assurance analysis model (MSR-
model; threats; vulnerabilities; attacks;
countermeasures)
THE END