Information Security
Information Security
Information Security
P. R. Prasad
Head – Dept. of Electronics
Avanthi Degree & PG College
What is Information ?
Information
An Organized, meaningful and usefeul
interpretation of data
Data Interpretatio
Process
n
What is Information Systems
What is Information Security
Need for Information Security
Protects the organization‘s ability to function
Enables the safe operation of applications implemented
on the organization‘s IT systems.
Protects the data the organization collects and uses
Safeguards the technology assets in use at the
organization
• ISMS is required to monitor the network
Benefits of ISMS
• ISMS is a standard of International standard of organization(ISO),
which is compatible with other standards prevailing in the market
• Helps to protect and secure information in an organization because
information is its virtual resource
• Maintain the security of data and information
•Information state
•Security services
•Security countermeasures
Information States
Security Services
Security Counter Measures
Technology is ever Technolog
encompasses
evolving. more than the adjunctive
y crypto
systems of the past.
Technology, in a security context now
includes hardware, software and firmware
that comprise a system or network.
Technology, from a security perspective now
includes devises such are firewalls, routers,
intrusion detection monitors, and other
security components.
Security Counter Measures
Policies and Practice : Operations as security
countermeasure, goes beyond policy and practices required
for use in secure systems.
I’m a
I Like You
I’m a
I Like Ya
Who
Like Ya
Types of Virus
• Stealth: It masks itself from application in
order to avoid detection.
Boot
Reco
rd Virus
Multipartite
• Effects in multiple ways.
Memory
Multipartite Virus
Disk Files
Boot Sector
Other Virus Types
• Retroviruses
• Armored
• Companion
• Phage
• Macro virus
Trojan Horses
Logic Bombs
• Logic bombs refer to
program or code that are
executed when a pre-
defined event occurs. It
displays a message to user
and occur at time the user
is accessing the internet or
making use of application
Worms
• It is the threats that are
self sufficient to replicate
themselves and do not
need any host application
to get transmitted.
• They are also capable of
delivering virus to a
system
• Not only RAM also takes
use of TCP/IP etc
Malware
Stopping Malware
Security Threats to E-Commerce
• Internet being a public domain is open to all.
• Each and every transaction that occurs on the
internet can be tracked, monitored, logged
and stored.
• The information that is shared over the
internet for carrying out transaction is
constantly under the security threats.
• These threats may rise from internal and
external sources.
Some top security threats from
internal and external sources
• Unauthorized internal user – access confidential information
by using stolen password.
• Former employees – who have maintained access to the
information sources directly by creating alternative
passwords.
• Weak access points in information infrastructure and security
that can expose company information and trade secrets
• Management that undermines security may be the greatest
risk to e-commerce
E-Cash
• E-Cash refers to electronic transfer of money in
the form of a block of data representing money
that is transferred online.
• It includes computer networks, Internet and
digitally stored value system
• E-Cash bears a digital signature for
authentication purposes and is sent over the
network in the form of data or tokens
E-Cash
• When the buyer needs to make a
transaction the wallet program
communicates with the bank.
• The bank authenticates the user
and after the user is found valid, it
transfers the requested e-cash to
the customer.
• The e-cash is then paid to the
seller using the wallet programs
to complete the transaction
• The e-cash company may or may
not charge a small amount as
merchant transaction charges.
Electronic Payment System
• It is an online monetary transactions which are called e-payment
schemes.
Public Key
The public key is made available to all those who
receive the signed messages from the sender. It is used
for verification of the received message.
Basic Requirements or components
• A subscriber of the private key and public key pair makes the
public key available to all those who are intended to receive
the signed messages from the subscriber.
• But in case of any dispute between the two sides, there must
be some entity with the receiver which will allow the receiver
of the message to prove that the message was indeed sent by
the subscriber of the key pair. This can be done with the Digital
Signature Certificate.
How it works
Cryptography and Encryption
Cryptography ensures secure transfer of data over an unsecured
network, such as internet.
To ensure secure transmission, data should look entirely different from
original data.
Plain Text
Cipher Text
Converting plain text to cipher text is called Encryption
Reverse process is called Decryption
Cryptography and Encryption
Key Key
Private Key encryption
• A Single key is used for both encryption and
decryption of data.
• Key is shared between the sender & the
intended recipient but hidden from remaining
users.
• The sender uses the private key to encrypt the
data and then sends the encrypted data to
intended recipient
Private Key encryption
– On receiving the, recipient decrypts using the
same key.
– Both the parties should know which key must be
used.
– The sender and the receiver can share the private
key by generating the key at the senders end,
encrypting using public key and then sending to
recipient.
– The length of the secret key determines the
strength of the encryption.
Private Key encryption
Plain Text
Plain Text
Internet
Encrypt with Decrypt with
secret key secret key
Ciphertext
Public Key Encryption
• Two keys are used to encrypt & decrypt data.
• Key used to encrypt is called public key.
• Key used to decrypt is called private key.
• First public and private keys must be generated to use
public key encryption.
• The public key is made available to anyone who wants
to send the data.
• The sender uses public key to encrypt and send the
encrypted data to receiver.
• The receiver uses the private key and decrypts the
data
Public Key encryption
Plaintext Plaintext
Framing Assessing
• Sense a threat & inform to • Analyze the level of risks
all the related activities that and the level of security
execute in a serial manner provided with our
to be ready to control and organization and its IS.
avert a possible damage. • The possible damages from
a threat can also assessed in
this activity.
Risk Management
Monitoring Responding
• Continuous checking of IS • Taking preventive or
and keeping an eye on corrective measures so that
other threats that may be systems can be kept
encountered by protected from any kind of
organization. threats whether internal or
• Defines proper guidelines external.
for the maintenance of
security of your systems.
Risk Management Process
Assess
Frame
Monitor Respond
Introduction to Security Policies and
Cyber Laws
Need for Information Security policy
Objective
• To protect Integrity, Confidentiality and availability of
information.
• Information is an asset.
• It is a part of any organization overall asset security policy
• It is a business process that allows management with the
process required to perform the fiduciary.
• The information security professionals of an organization are
responsible to implement security policies that the business
and mission requirements of an organization
Introduction to Indian cyber law
• An Ethical hacker must get a signed legal document from the
target organization.
• The hacker should know when and where to use their skills
and must understand the consequences of misusing it.
• Cybercrimes involve criminal activities such as fraud, theft,
forgery and defamation which is subjected to IPC.
• All the cybercrimes are addressed by IT Act 2000
• A separate set of laws known as cyber laws or internet laws
has been designed to regulate cybercrimes.
• Two categories of Cyber laws are framed.
Two categories of cyber law
• Computer as Target: Specifies that a computer is used as a
tool to attack other computers such as virus and worm
attacks.
• Computer as Weapon: Specifies that a computer is used as
weapon to commit crimes such as credit card frauds, cyber
terrorism and pornography
Objective and Scope of the IT Act, 2000
• It was legislated on May 17, 2000.
• 94 sections grouped into 13 chapters
• Four schedules included.
• It aims at the regulation of use of IT.
• It legalizes and regulates the system of electronic data
interchange, electronic communication and e-Commerce.
• The act covers use of all the computer systems & networks
located in India.
• Later amended in 2008.
• Now it has 124 sections and 14 chapters
• Replaced Schedules I & II and deleted III & IV.
Objective and Scope of the IT Act, 2000
• India is the 12th country in the world to adopt cyber laws.
• IT act 2000 addresses issues such as legal recognition and
securing of electronic records and digital signatures and issue
of digital signature certificates.
• The amendment in 2008 has brought several additional new
sections in it regarding offences such as cyber terrorism and
data protection
Chapters of IT ACT 2000
Chapter 1 deals with the important definitions of the terms used in the regulation. It sets the
scope of meaning of key terms of which the Act comprises.
Chapter 2 covers regulations regarding digital signature. It provides legal recognition to
digital signature.
Chapter 3 deals with electronic governance. It legalizes the use of electronic records in
government organizations and establishments.
Chapter 4 Involves attribution, acknowledgement and dispatch of electronic records and
their certifying authority.
Chapter 5 comprises secure e-records & digital signatures. It establishes rues & regulations
related to the electronic gazettes.
Chapter 9 comprises penalties and adjudication by the cyber regulations appellate Tribunal.
It covers penalty for damaging a computer and computer systems.
Chapter 10 deals about the establishment of the CRAT to secure justice in such cases.
Chapter 13 – Miscellaneous
Intellectual Property Rights (IPR)
Intellectual Property Rights (IPR)
Intellectual Property Rights (IPR)
Intellectual Property Rights (IPR)
Intellectual Property Rights (IPR) or
IPR Laws
Intellectual Property Rights (IPR)
Intellectual Property Rights (IPR)
Intellectual Property Rights (IPR)
Intellectual Property Rights (IPR)
Intellectual Property Rights (IPR)
Intellectual Property Rights (IPR)
Intellectual Property Rights (IPR)
Intellectual Property Rights (IPR)
Intellectual Property Rights (IPR)
Intellectual Property Rights (IPR)