Information Systems Security
Information Systems Security
Information classification
Integrity
Integrity is the quality or state of being whole, complete, and uncorrupted. The integrity of
information is threatened when it is exposed to corruption, damage, destruction, or other
disruption of its authentic state. Corruption can occur while information is being compiled,
stored, or transmitted.
Availability
Availability is the characteristic of information that enables user access to information without
interference or obstruction and in a required format. A user in this definition may be either a
person or another computer system. Availability does not imply that the information is accessible
to any user; rather, it means availability to authorized users.
Privacy
The information that is collected, used, and stored by an organization is to be used only for the
purposes stated to the data owner at the time it was collected. This definition of privacy does
focus on freedom from observation (the meaning usually associated with the word), but rather
means that information will be used only in ways known to the person providing it.
Identification
An information system possesses the characteristic of identification when it is able to recognize
individual users. Identification and authentication are essential to establishing the level of access
or authorization that an individual is granted.
Authentication
Authentication occurs when a control provides proof that a user possesses the identity that he or
she claims.
Authorization
After the identity of a user is authenticated, a process called authorization provides assurance
that the user (whether a person or a computer) has been specifically and explicitly authorized by
the proper authority to access, update, or delete the contents of an information asset.
Accountability
The characteristic of accountability exists when a control provides assurance that every activity
undertaken can be attributed to a named person or automated process. For example, audit logs
that track user activity on an information system provide accountability.
History of computer security and Information Security
• Began immediately after the first mainframes were developed
• Groups developing code-breaking computations during World War II created the first
modern computers
• Physical controls to limit access to sensitive military locations to authorized personnel
• Rudimentary in defending against physical theft, espionage, and sabotage
The 1960s
• Advanced Research Procurement Agency (ARPA) began to examine feasibility of
redundant networked communications
• Larry Roberts developed ARPANET from its inception
The 1970s and 80s
• ARPANET grew in popularity as did its potential for misuse
• Fundamental problems with ARPANET security were identified
– No safety procedures for dial-up connections to ARPANET
– Non-existent user identification and authorization to system
• Late 1970s: microprocessor expanded computing capabilities and security threats
R-609
• Information security began with Rand Report R-609 (paper that started the study of
computer security)
• Scope of computer security grew from physical security to include:
– Safety of data
– Limiting unauthorized access to data
– Involvement of personnel from multiple levels of an organization
The 1990s
• Networks of computers became more common; so too did the need to interconnect
networks
• Internet became first manifestation of a global network of networks
• In early Internet deployments, security was treated as a low priority
The Present
• The Internet brings millions of computer networks into communication with each other—
many of them unsecured
• Ability to secure a computer’s data influenced by the security of every computer to which
it is connected
Security/Privacy Vulnerabilities
Types of Vulnerabilities
• Physical vulnerabilities (Ex. Buildings)
• Natural vulnerabilities (Ex. Earthquake)
• Hardware and Software vulnerabilities (Ex. Failures)
• Media vulnerabilities (Ex. Disks can be stolen)
• Communication vulnerabilities (Ex. Wires can be tapped)
• Human vulnerabilities (Ex. Insiders)