Unit1 - Introduction and Unit 7 Information Security
Unit1 - Introduction and Unit 7 Information Security
Rajan Sharma
Course Objectives
• To provide knowledge on principles
and practices of network security
Course Outline
Course Outline
Course Outline
References
• Lecture Notes
• Tutorials
UNIT:1Introduction
Data, Information and
Knowledge
• Data
❖ recording of “something” measured
❖ Raw material, just measured
• Information
❖ Information is the result of processing, manipulating and
organizing data in a way that adds to the knowledge of the
receiver.
❖ Processed data
• Knowledge
❖ Knowledge is normally processed by means of structuring,
grouping, filtering, organizing or pattern recognition.
❖ Highly structured information
Data, Information and
Knowledge
• Information Systems is the collection of hardware,
software, data, people and procedures that are designed
to generate information that supports the day-to-day,
operations.
What is Information Security?
• Information security is the process of protecting information from
unauthorized access, use, disclosure, destruction, modification, or
disruption
• The protection of computer systems and information from harm,
theft, and unauthorized use.
• Protecting the confidentiality, integrity and availability of information
• Information security is an essential infrastructure technology to
achieve successful information-based society
• Highly information-based company without information security will
lose competitiveness
11
Information Security
Information Security Today
• Today's online consumers routinely deal with
spyware, adware and malware, which present
threats ranging from simple annoyance to password
theft to Loss of critical property.
• Pretexting:
When a threat actor impersonates an authority figure or someone that the target would
easily trust to get the person to do something they normally wouldn't.
• Baiting:
When threat actors leave a malware-infected device, such as a USB or CD, in a place where
it can be easily found by someone, who would then use the infected device on their
computer and accidentally install the malware, giving the threat actors access to the
target's system
• Quid Pro Quo:
When a threat actor requests personal information in exchange for some form of
reward, e.g., money, free gift, or a free service
Network Security
• "Network Security" encompasses the various
measures and practices put in place to protect
computer networks from unauthorized access,
misuse, modification, or disruption.
• It involves the deployment of hardware, software,
policies, and procedures to ensure the
confidentiality, integrity, and availability of network
resources and data.
Goals of Network Security
1. Confidentiality: Ensuring that data is accessible only to
authorized users or entities.
2. Integrity: Maintaining the accuracy and completeness of data,
ensuring that it has not been altered or tampered with.
3. Availability: Ensuring that network resources and services are
accessible and usable when needed, and protected against
denial-of-service (DoS) attacks.
4. Authentication: Verifying the identity of users, devices, or
entities attempting to access the network or its resources.
5. Authorization: Granting or denying access rights to users or
entities based on their authenticated identity and
permissions.
Aspect Information Security Network Security Cybersecurity
Focus Protecting the confidentiality, Securing computer Safeguarding digital assets and
integrity, and availability of networks and their systems against cyber threats.
information assets. components.
Scope Encompasses all forms of Specifically focuses on Broader concept that includes
information, digital and securing network both information security and
physical, regardless of traffic, data network security, along with
location or format. transmission, and additional elements related to
communication cyber threats.
channels.
Compon Data encryption, access Firewalls, intrusion Application security, cloud
ents controls, identity detection/prevention security, endpoint security,
management, security systems (IDS/IPS), security awareness training,
policies, risk management, VPNs, encryption along with elements of
compliance. protocols, network information security and
access controls. network security.
Example Encrypting sensitive customer Configuring firewall Implementing a comprehensive
data, restricting access to rules, implementing cybersecurity program with
authorized personnel, VPNs, monitoring network security measures,
conducting security audits. network traffic for information security controls,
suspicious activity. and additional layers of
protection such as endpoint
security solutions and employee
security training.
Working of Network Security
• This is the most basic level that includes protecting the data and network
through unauthorized personnel from acquiring control over the
confidentiality of the network.
• This type serves two purposes. One is protected from unauthorized users,
and the other is protected from malicious activities.
• This level of network security protects user behavior like how the permission
has been granted and how the authorization process takes place.
Need of Network Security
1. Functionality. Network security ensures the ongoing high performance of the
networks
2. Privacy and security. . Network security prevents the security breaches sensitive
information, damage a business's reputation and result in financial losses.
3. Intellectual property protection. Securing access to intellectual property related
to products, services and business strategies helps organizations maintain their
competitive edge.
4. Compliance. Complying with data security and privacy regulations,
5. Protection against cyber threats like malware, viruses, and phishing attacks.
6. Safeguarding sensitive data from unauthorized access, theft, or disclosure.
7. Prevention of unauthorized access to networks and systems.
8. Ensuring business continuity by minimizing the impact of security incidents.
9. Compliance with regulatory requirements and data security standards.
10.Preservation of reputation and customer trust.
11.Support for remote workforce security in the era of remote work.
Challenges of Network Security
1. Evolving network attack methods.
• The biggest network security challenge is the rate at which cyber attacks evolve.
• Threat actors and their methods constantly change as technology changes.
• For example, new technology, such as blockchain, has led to new types of malware
attacks, such as cryptojacking. As a result, network security defense strategies must
adapt to these new threats.
2. User adherence.
• It can be difficult for organizations to ensure that everyone is adhering to network
security best practices, while simultaneously evolving those strategies to address the
newest threats.
3. Remote and mobile access.
• More companies are adopting bring your own device policies, which means a more
distributed and complex network of devices for organizations to protect. Remote
work is also more prevalent.
• This makes wireless security more important, as users are more likely to be using a
personal or public network when accessing company networks.
4. Third-party partners.
• Cloud providers, managed security services and security product vendors often get
access to an organization's network, opening new potential vulnerabilities.
Types of Network Security
1. Access Control:
• Not every person should have a complete allowance for the accessibility to the
network or its data. One way to examine this is by going through each
personnel’s details.
• This is done through Network Access Control which ensures that only a handful
of authorized personnel must be able to work with the allowed amount of
resources.
9. Behavioral analytics.
• This method analyzes network behavior and automatically detects
and alerts organizations to abnormal activities.
UNIT 7: Information Security
Critical Characteristics of Information
1.Availability
• Availability enables authorized users—persons or computer systems—
to access information without interference or obstruction and to
receive it in the required format.
2.Accuracy
• Information has accuracy when it is free from mistakes or errors and it
has the value that the end user expects.
• If information has been intentionally or unintentionally modified, it is
no longer accurate.
• Consider, for example, a checking account. You assume that the
information contained in your checking account is an accurate
representation of your finances. Incorrect information in your
checking account can result from external or internal errors.
Critical Characteristics of Information
3.Authenticity
• Authenticity of information is the quality or state of being
genuine or original, rather than a reproduction or
fabrication.
• Information is authentic when it is in the same state in
which it was created, placed, stored, o r transferred.
4.Confidentiality
• Information has confidentiality when it is protected from
disclosure or exposure to unauthorized individuals or
systems.
Critical Characteristics of Information
5.Integrity
• Information has integrity when it is whole, complete, and uncorrupted.
• The integrity of information is threatened when the information is exposed to
corruption damage, destruction, or other disruption of its authentic state.
• Corruption can occur while information is being stored or transmitted.
• Many computer viruses and worms are designed with the explicit purpose of
corrupting data.
6.Utility
• The utility of information is the quality or state of having value for some
purpose or end.
• Information has value when it can serve a purpose. If information is
available, but is not in a format meaningful to the end user, it is not useful.
7.Possession
• The possession of information is the quality or state of ownership or control.
• Information is said to be in one ’s possession if one obtains it, independent of
format or other characteristics.
Information Security
• Information Security (InfoSec) is a discipline
concerned with protecting the confidentiality,
integrity, and availability of information assets within
an organization.
• It involves the implementation of policies,
procedures, technologies, and controls to safeguard
sensitive information from unauthorized access,
disclosure, alteration, or destruction.
Information Security
• It involves the protection of information systems and
the information processed, stored and transmitted
by these systems from unauthorized access, use,
disclosure, disruption, modification or destruction.
• This includes the protection of personal information,
financial information, and sensitive or confidential
information stored in both digital and physical forms.
Effective information security requires a
comprehensive and multi-disciplinary approach,
involving people, processes, and technology.
Need of Information Security
1. Ensuring CIA (Confidentiality, Integrity and Availability ) of
information
• Confidentiality: Keeping sensitive information confidential
and protected from unauthorized access.
• Integrity: Maintaining the accuracy and consistency of
data, even in the presence of malicious attacks.
• Availability: Ensuring that authorized users have access to
the information they need, when they need it.
2. Protecting sensitive information:
• Information security helps protect sensitive information from
being accessed, disclosed, or modified by unauthorized
individuals.
• This includes personal information, financial data, and trade
secrets, as well as confidential government and military
information.
Need of Information Security
3.Mitigating risk:
• By implementing information security measures,
organizations can mitigate the risks associated with cyber
threats and other security incidents
66
CNSS: (United States) Committee on National Security Systems
Threats to Information Security
Threats
Types of Threats
Types of Threats
Types of Threats
Types of Threats
Types of Threats
Types of Threats
Types of Threats
Types of Threats
Types of Threats
Deliberate Software Attacks
Deliberate Software Attacks
Deliberate Software Attacks
Deliberate Software Attacks
Deliberate Software Attacks
Deliberate Software Attacks
Deliberate Software Attacks
Deliberate Software Attacks
Deliberate Software Attacks
Deliberate Software Attacks
Malwares
• Malware is a combination of 2 terms- Malicious and
Software.
• So Malware basically means malicious software that
can be an intrusive program code or anything that is
designed to perform malicious operations on system
Malwares
• Virus –
• They have the ability to replicate themselves by hooking them to the
program on the host computer like songs, videos etc and then they
travel all over the Internet.
• The Creeper Virus was first detected on ARPANET. Examples include
File Virus, Macro Virus, Boot Sector Virus, Stealth Virus etc.
• Worms –
• Worms are also self-replicating in nature but they don’t hook
themselves to the program on host computer.
• Biggest difference between virus and worms is that worms are
network-aware.
• They can easily travel from one computer to another if network is
available and on the target machine they will not do much harm, they
will, for example, consume hard disk space thus slowing down the
computer.
Malwares
• Trojan –
• Their purpose is to conceal themselves inside the software that seem
legitimate and when that software is executed they will do their task
of either stealing information or any other purpose for which they are
designed.
• They often provide backdoor gateway for malicious programs or
malevolent users to enter your system and steal your valuable data
without your knowledge and permission. Examples include FTP
Trojans, Proxy Trojans, Remote Access Trojans etc.
• Bots –:
• can be seen as advanced form of worms. They are automated
processes that are designed to interact over the internet without the
need for human interaction.
• They can be good or bad. Malicious bot can infect one host and after
infecting will create connection to the central server which will
provide commands to all infected hosts attached to that network
called Botnet.
Malwares
Adware – Adware is not exactly malicious but they do breach privacy of the users.
• They display ads on a computer’s desktop or inside individual programs.
Spyware – It is a program or we can say software that monitors your activities on
computer and reveal collected information to an interested party.
• Spyware are generally dropped by Trojans, viruses or worms. Once dropped
they install themselves and sits silently to avoid detection.
• One of the most common example of spyware is KEYLOGGER. The basic job of
keylogger is to record user keystrokes with timestamp. Thus capturing
interesting information like username, passwords, credit card details etc.
Ransomware – It is type of malware that will either encrypt your files or will lock
your computer making it inaccessible either partially or wholly. Then a screen will be
displayed asking for money i.e. ransom in exchange.
Rootkits – are designed to gain root access or we can say administrative privileges in
the user system. Once gained the root access, the exploiter can do anything from
stealing private files to private data.
Zombies – They work similar to Spyware. Infection mechanism is same but they don’t
spy and steal information rather they wait for the command from hackers.
Information Security Implementation:
OSI Security Architecture
• It consider three aspects of information
security:
Information Security Implementation:
OSI Security Architecture
➢ Security attack – Any action that compromises the
security of information owned by an organization.
➢ Security mechanism – A mechanism that is designed to
detect, prevent or recover from a security attack.
➢ Security service – A service that enhances the security of
the data processing systems and the information transfers
of an organization. The services are intended to counter
security attacks and they make use of one or more security
mechanisms to provide the service.
Security Attack
Authentication exchange:
➢ This refers to the exchange of some information between two
communicating parties to prove their identity to each other.
Traffic padding:
➢ This refers to the insertion of extra bits into the stream of data
traffic to prevent traffic analysis attempts by attackers.
Security Mechanism
Routing control:
➢ This refers to the selection of a physically secured route for data
transfer.
➢ It also allows changing of route if there is any possibility of
eavesdropping on a certain route.
Notarization:
➢ This refers to the selection of a trusted third party for ensuring
secure communication between two communicating parties.
Access control:
➢ It refers to the methods used to ensure that a user has the right to
access the data or resource.
Security Service/ Principles of Security
Confidentiality:
➢ The principle of confidentiality specifies that only the sender
Non repudiation
➢ Requires that neither the sender nor the receiver of a message
Impact Can have immediate and visible May have subtler and longer-term
impacts such as service disruptions, impacts such as data breaches,
data breaches, financial losses, or identity theft, or unauthorized
reputational damage. access to systems.
Dangerou They are dangerous for the integrity They can be dangerous for
s for and availability of the message. confidentiality of the message.
Layering
➢ refers to the use of multiple, overlapping protection
approaches addressing the people, technology, and
operational aspects of information systems
Least astonishment
➢ means that a program or user interface should always respond
in the way that is least likely to astonish the user
A Network Security Model
A Network Security Model
• Network Security Model exhibits how the security service has
been designed over the network to prevent the opponent from
causing a threat to the confidentiality or authenticity of the
information that is being transmitted through the network.
• This model shows that there are four basic tasks in designing a
particular security service:
1. Design an algorithm for performing the security-related transformation.
2. Generate the secret information to be used with the algorithm.
3. Develop methods for the distribution and sharing of secret information.
4. Specify a protocol to be used by the two principals that make use of the
security algorithm and the secret information to achieve a particular
security service.
A Network Security Model
Any security service would have the three components
• 1. Transformation of the information which has to be sent to the receiver. So,
that any opponent present at the information channel is unable to read the
message. This indicates the encryption of the message.
• 2. Sharing of the secret information (encryption key ) between sender and
receiver of which the opponent must not have any clue.
• 3. There must be a trusted third party which should take the responsibility
of distributing the secret information (key) to both the communicating parties
and also prevent it from any opponent.
Network Access Security Model
Network Access Security Model
• Network access security model is designed to secure the
information system which can be accessed by the attacker
through the network.
• The attackers try to attack our system that is accessible
through the internet. These attackers fall into two categories:
– 1. Hacker: The one who is only interested in penetrating into your system. They
do not cause any harm to your system they only get satisfied by getting access to
your system.
– 2. Intruders: These attackers intend to do damage to your system or try to obtain
the information from the system which can be used to attain financial gain.
a) Access control
b) Confidentiality
c) Availability
d) All of the above
Review
• Which one of the following refers to the
technique used for verifying the integrity of
the message?
a) Digital signature
b) Decryption algorithm
c) Protocol
d) Message Digest
Review
• Which one of the following is also referred
to as malicious software?
a) Maliciousware
b) Badware
c) Ilegalware
d) Malware
Review
• Which type of malware is designed to
encrypt files on a victim's system and
demand payment for decryption?
– a) Virus
– b) Worm
– c) Trojan horse
– d) Ransomware
Review
• Which of the following is a principle of
least privilege?
– a) All users should have full access to all resources
– b) Users should only have access to the resources necessary for
their roles
– c) Access control should be based on user identities
– d) Access to resources should be controlled by access control
lists
Review
• Which of the following is a type of network
attack that involves flooding a network with
excessive traffic to disrupt normal
operation?
– a) Brute force attack
– b) Phishing attack
– c) Denial-of-Service (DoS) attack
– d) Man-in-the-Middle (MITM) attack
Review
• A ____________ can be a hardware
device or a software program that filters all
the packets of data that comes through a
network, the internet, etc.
– a. Firewall
– b. Antivirus
– c. Malware
– d. Cookies
END of UNIT 7
Thank You.