INF 806 - Information Security Lecture Slide 1
INF 806 - Information Security Lecture Slide 1
validity of something)
Confidentiality: Certain information must be kept secret from unauthorised access.
Importance of confidentiality
Loss of revenue
Loss of reputation
Loss of clients/customers Embarrassment
You may be in breach of a legal/moral/ethical obligation to keep information
confidential
Ensuring confidentiality
Encryption (Is a method by which information is converted into secret code that
hides the information true meaning)
Access Control (Is a way of limiting access to system, physical or virtual
resources. Is a process by which users are granted access and certain privileges
to systems, resources or information)
Integrity: Ensures that information and systems have not been altered in an unauthorised
way
Importance of Integrity
Breaches
Malfunctions
Unauthorised changes
People
Malware
Ensuring integrity
Hashing (Hashing is generating a value or values from a string of text using a
mathematical function and is one way to enable security during the process of
message transmission, which helps to protect the security of the transmission against
tampering.)
Error correcting codes (Error correction is the process of detecting errors in transmitted
messages and reconstructing the original error-free data. Error correction ensures
that corrected and error-free messages are obtained at the receiver side)
Availability
Information or systems are accessible and modifiable in a timely
fashion by those authorized to do so.
Lack of availability is often referred to as a denial of service.
Ensuring Availability
Data backups
Redundant systems
Disaster recovery plans
Authentication is the process of recognizing a user's identity.
Verification of claim (you are who you say you are, where you
say you are, at the time that you say it is)
Non-Repudiation (Non-repudiation is the prevention of either the
sender or the receiver denying a transmitted message)
Accountability (means that the system is able to provide audit
trails of all transactions)
Why Security?
Cyberspace (internet, work environment, intranet) is becoming a
dangerous place for all organizations and individuals to protect their
sensitive data or reputation. This is because of the numerous people
and machines accessing it.
Hacking tools can be found very easily by everyone just by googling
and they are endless.
Technology with the end-users has increased rapidly within these
years, like internet bandwidth and computer processing speeds.
Access to hacking information manuals.
https://www.cybintsolutions.com/cyber-security-facts-stats/
The History of Information Security
Began immediately after the first mainframes were developed
Groups developing code-breaking computations during World War II created the first modern
computers
Physical controls to limit access to sensitive military locations to authorized personnel
Rudimentary in defending against physical theft, espionage, and sabotage
The 1960s
Advanced Research Procurement Agency (ARPA) began to examine feasibility of redundant
networked communications. Larry Roberts developed ARPANET from its inception.
The 1970s and 80s
ARPANET grew in popularity as did its potential for misuse
Fundamental problems with ARPANET security were identified
No safety procedures for dial-up connections to ARPANET
Non-existent user identification and authorization to system
Late 1970s: microprocessor expanded computing capabilities and security threats
R-609
Information security began with Rand Report R-609 (paper that started the study of computer security)
Scope of computer security grew from physical security to include:
Safety of data
Limiting unauthorized access to data
Involvement of personnel from multiple levels of an organization
The 1990s
Networks of computers became more common; so too did the need to interconnect networks
Internet became first manifestation of a global network of networks
In early Internet deployments, security was treated as a low priority
The Present
The Internet brings millions of computer networks into communication with each other—many of them
unsecured
Ability to secure a computer’s data influenced by the security of every computer to which it is connected
Components of an Information System
Information System (IS) is entire set of software, hardware, data,
people, procedures, and networks necessary to use information as a
resource in the organization
Computer can be subject of an attack and/or the object of an attack
When the subject of an attack, computer is used as an active tool to
conduct attack
When the object of an attack, computer is the entity being attacked
Threats to Information Security
A threat is an object, person, or other entity that represents a constant danger
to an asset.
In Information Security threats can be like Software attacks, theft of
intellectual property, identity theft, theft of equipment or information,
sabotage, and information extortion.
Threat can be anything that can take advantage of a vulnerability to breach
security and negatively alter, erase, harm object or objects of interest.
Software attacks means attack by Viruses, Worms, Trojan Horses etc. Many
users believe that malware, virus, worms, bots are all same things. But they
are not same, only similarity is that they all are malicious software that
behave differently.
Malware is a combination of 2 terms- Malicious and Software. So Malware
basically means malicious software that can be an intrusive program code or
a anything that is designed to perform malicious operations on system.
To better understand the numerous threats facing the organization,
a categorization scheme has been developed.
By examining each threat category in turn, management can most
effectively protect its information through policy, education and
training, and technology controls.