Ch. 1 Info Sec
Ch. 1 Info Sec
Security Concepts of
Information Assurance
Module Objective
Fundamental Principles:
● Confidentiality: Ensuring that
information is only accessible to those
authorized to view it.
● Integrity: Maintaining the accuracy and
reliability of data, ensuring it is not altered
or tampered with.
● Availability: Ensuring that information
and resources are accessible to
authorized users when needed.
CONFIDENTIALITY
•information or data
•systems and processes for business
operations
•organizations
•people and their actions
INTEGRITY
Data integrity is the assurance that data has not
been altered in an unauthorized manner. This requires
the protection of the data in systems and during
processing to ensure that it is free from improper
modification, errors or loss of information and
is recorded, used and maintained in a way that
ensures its completeness.
•Knowledge-based
•Token-based
•Characteristic-based
NON-REPUDIATION
● Non-repudiation is a crucial principle in
information security that ensures that a
party in a transaction cannot deny the
authenticity of their signature on a
document or the sending of a message
itself. It provides proof of the origin, delivery,
and integrity of data.
Digital Signatures
Digital signatures are cryptographic equivalents of handwritten signatures
or stamped seals. They provide proof of origin, identity, and status of an
electronic document.
NON-REPUDIATION
Cryptographic Techniques
1. Public Key Infrastructure (PKI)
2. Hash Functions and Digital Signatures
3. Timestamping Services
4. Secure Communication Protocols
Legal Implications
Non-repudiation is not only a technical issue but
also a legal one. It plays a vital role in
agreements, contracts, and transactions and is
recognized by various legal systems around the
world.
PRIVACY
Risk Identification
Risk assessment
Risk treatment
Risk treatment
Risk treatment
Risk treatment
Risk treatment
Security controls
pertain to the physical, technical and
administrative mechanisms that act as
safeguards or countermeasures prescribed for
an information system to protect the
confidentiality, integrity and availability of the
system and its information.
SECURITY CONTROL
Physical controls
address process-based security needs using
physical hardware devices, such as badge
readers, architectural features of buildings
and facilities, and specific security actions to
be taken by people.
SECURITY CONTROL
Technical controls
(also called logical controls) are security
controls that computer systems and networks
directly implement. These controls can
provide automated protection from
unauthorized access or misuse, facilitate
detection of security violations and support
security requirements for applications and
data.
SECURITY CONTROL
• User Management
• Privilege Management
• Employee Security, Clearance, and Evaluation
• Employee training and awareness, etc.
SECURITY CONTROL
• User Management
• Privilege Management
• Employee Security, Clearance, and Evaluation
• Employee training and awareness, etc.
Module 4 : Understand
Governance Elements and
Processes
Module Objective
Importance of Governance