Basic of Infosec
Basic of Infosec
AND PRIVACY
DATA AND INFORMATION
Data– Raw facts
Alphanumeric, image, audio, video
Information- a collection of facts organized in
such a way that they have an additional value
beyond the value of the facts themselves
Information security- Protection of crucial
information including hardware and software
that is used, stored, and transmit information.
THREAT AND VULNERABILITY
Threat- a possible event that can damage or
harm your information system
Vulnerability- weakness of the system. Its is the
degree of exposure in view of threat
INFORMATION SECURITY
Information Security is not only about securing
information from unauthorized access.
Information Security is basically the practice of
preventing unauthorized access, use, disclosure,
disruption, modification, inspection, recording or
destruction of information.
Information can be physical or electronic one.
Information can be anything like Your details or we
can say your profile on social media, your data in
mobile phone, your biometrics etc.
Thus Information Security spans so many research
areas like Cryptography, Mobile Computing, Cyber
Forensics, Online Social Media etc.
CONTINUE..
During First World War, Multi-tier Classification
System was developed keeping in mind
sensitivity of information. With the beginning of
Second World War formal alignment of
Classification System was done. Alan Turing was
the one who successfully decrypted Enigma
Machine which was used by Germans to encrypt
warfare data.
PRINCIPLE OF INFORMATION SYSTEM
SECURITY
Information System Security or INFOSEC refers
to the process of providing protection to the
computers, networks and the associated data.
With the advent of technology, the more the
information is stored over wide networks, the
more crucial it gets to protect it from the
unauthorized which might misuse the same.
Every organisation has the data sets that contain
confidential information about its activities.
Information Security programs are build around
3 objectives, commonly known as CIA –
Confidentiality, Integrity, Availability.
CONTINUE..
CONFIDENTIALITY
Confidentiality – means information is not
disclosed to unauthorized individuals, entities
and process. For example if we say I have a
password for my Gmail account but someone saw
while I was doing a login into Gmail account. In
that case my password has been compromised
and Confidentiality has been breached.
INTEGRITY
Integrity – means maintaining accuracy and
completeness of data. This means data cannot be
edited in an unauthorized way. For example if an
employee leaves an organisation then in that
case data for that employee in all departments
like accounts, should be updated to reflect status
to JOB LEFT so that data is complete and
accurate and in addition to this only authorized
person should be allowed to edit employee data.
AVAILABILITY
Availability – means information must be
available when needed. For example if one needs
to access information of a particular employee to
check whether employee has outstanded the
number of leaves, in that case it requires
collaboration from different organizational teams
like network operations, development operations,
incident response and policy/change
management.
OTHER PRINCIPLE
Non repudiation – means one party cannot deny
receiving a message or a transaction nor can the
other party deny sending a message or a
transaction.
For example in cryptography it is sufficient to
show that message matches the digital signature
signed with sender’s private key and that sender
could have a sent a message and nobody else
could have altered it in transit.
Data Integrity and Authenticity are pre-
requisites for Non repudiation.
CONTINUE..
Authenticity – means verifying that users are
who they say they are and that each input
arriving at destination is from a trusted source.
This principle if followed guarantees the valid
and genuine message received from a trusted
source through a valid transmission.
CONTINUE..
For example if take above example sender sends
the message along with digital signature which
was generated using the hash value of message
and private key. Now at the receiver side this
digital signature is decrypted using the public
key generating a hash value and message is
again hashed to generate the hash value. If the 2
value matches then it is known as valid
transmission with the authentic or we say
genuine message received at the recipient side.
QUESTIONS
Which Of The Following Is An Independent
Malicious Program That Need Not Any Host
Program?
Trap Doors
Trojan Horse
Virus
Worm
BALANCING INFORMATION SECURITY AND
ACCESS:
It is the sole purpose of the organization to
protect the interests of the users and to provide
them with the appropriate amount of information
whenever necessary.
Also, at the same time, it is necessary to provide
adequate security to the information so that not
anyone can access it.
The need for maintaining the perfect balance of
information security and accessibility arises from
the fact that information security can never be
absolute.
CONTINUE..
It would be harmful to provide free access to a
piece of information and it would be hard to
restrict any accessibility.
So, one needs to make sure that the exact
required balance is maintained so that both the
users and the security professionals are happy.
WHY INFORMATION SECURITY
Fast growth of internet
Commercialization of internet
Legal aspects
Financial frauds
Confidentiality
Integrity
Authentication
CONCLUSION
At the core of Information Security is
Information Assurance, which means the act of
maintaining CIA of information, ensuring that
information is not compromised in any way when
critical issues arise. These issues are not limited
to natural disasters, computer/server
malfunctions etc.
Thus, the field of information security has grown
and evolved significantly in recent years. It offers
many areas for specialization, including securing
networks and allied infrastructure, securing
applications and databases, security testing,
information systems auditing, business
continuity planning etc.
REASONS WHY INFORMATION SYSTEMS
ARE IMPORTANT FOR BUSINESS TODAY
Running a successful business calls for proper
management of financial and organizational data
and statistics with quality information systems.
Almost every company has experienced a
drastically slowed workflow because of data
problems related to reliability and accuracy.
It’s true that there is no substitute for right
information at the right time in the business
world.
CONTINUE..
This prompted the development of systems that
can be used to make the information accurate,
readily available, and easily accessible.
With the effectiveness of information systems, an
organization can have better decision-making,
better planning, and ultimately better results.
QUESTIONS
Why Would A Hacker Use A Proxy Server?
To Create A Stronger Connection With The
Target.
To Create A Ghost Server On The Network.
Fire Attacks
Unauthorized Attacks
IMPORTANCE OF INFORMATION SYSTEMS
To gain the maximum benefits from your
company's information system, you have to
exploit all its capacities.
Information systems gain their importance by
processing the data from company inputs to
generate information that is useful for managing
your operations.
To increase the information system's
effectiveness, you can either add more data to
make the information more accurate or use the
information in new ways.
1. BUSINESS COMMUNICATION SYSTEMS
Part of management is gathering and distributing
information, and information systems can make this
process more efficient by allowing managers to
communicate rapidly.
Email is quick and effective, but managers can use
information systems even more efficiently by storing
documents in folders that they share with the
employees who need the information. This type of
communication lets employees collaborate in a
systematic way.
Each employee can communicate additional
information by making changes that the system
tracks. The manager collects the inputs and sends the
newly revised document to his target audience.
2. BUSINESS OPERATIONS MANAGEMENT
How you manage your company's operations
depends on the information you have.
Information systems can offer more complete and
more recent information, allowing you to operate
your company more efficiently.
You can use information systems to gain a cost
advantage over competitors or to differentiate
yourself by offering better customer service. Sales
data give you insights about what customers are
buying and let you stock or produce items that
are selling well.
With guidance from the information system, you
can streamline your operations.
3. COMPANY DECISION-MAKING
The company information system can help you
make better decisions by delivering all the
information you need and by modeling the results
of your decisions.
A decision involves choosing a course of action
from several alternatives and carrying out the
corresponding tasks.
When you have accurate, up-to-date information,
you can make the choice with confidence.
CONTINUE..
If more than one choice looks appealing, you can
use the information system to run different
scenarios.
For each possibility, the system can calculate key
indicators such as sales, costs and profits to help
you determine which alternative gives the most
beneficial result.
QUESTION
What is called periodic assessment of security
vulnerability in computer system?
A : Threat
B : Attack
C : Hacking
D : Security audit
4. COMPANY RECORD-KEEPING
Your company needs records of its activities for
financial and regulatory purposes as well as for
finding the causes of problems and taking corrective
action.
The information system stores documents and
revision histories, communication records and
operational data.
The trick to exploiting this recording capability is
organizing the data and using the system to process
and present it as useful historical information.
You can use such information to prepare cost
estimates and forecasts and to analyze how your
actions affected the key company indicators.
WHY SECURITY?
Cyberspace (internet, work environment,
intranet) is becoming a dangerous place for all
organizations and individuals to protect their
sensitive data or reputation. This is because of
the numerous people and machines accessing it.
It is important to mention that the recent studies
have shown a big danger is coming from internal
threats or from disappointed employees like the
Edward Snowden case, another internal threat is
that information material can be easy accessible
over the intranet.
CONTINUE..
One important indicator is the IT skills of a
person that wants to hack or to breach your
security has decreased but the success rate of it
has increased, this is because of three main
factors −
Hacking tools that can be found very easily by
everyone just by googling and they are endless.
Technology with the end-users has increased rapidly
within these years, like internet bandwidth and
computer processing speeds.
Access to hacking information manuals.
SECURITY BREACH
WHAT IS COMPUTER SECURITY?
Computer security basically is the protection of
computer systems and information from harm,
theft, and unauthorized use. It is the process of
preventing and detecting unauthorized use of
your computer system.
There are various types of computer security
which is widely used to protect the valuable
information of an organization.
WHAT TO SECURE?
Let’s see this case, you are an IT administrator in
a small company having two small servers
staying in a corner and you are very good at your
job. You are doing updates regularly, setting up
firewalls, antiviruses, etc. One day, you see that
the organization employees are not accessing the
systems anymore. When you go and check, you
see the cleaning lady doing her job and by
mistake, she had removed the power cable and
unplugged the server.
This case indicates that even physical security is
important in computer security, as most of us
think it is the last thing to take care of.
CONTINUE..
QUESTION
What is called a single point of access for several
networking services?
A : Phishing
B : Web service
C : Directory service
D : Worms
WHAT ALL TO SECURE?
First of all, is to check the physical security by
setting control systems like motion alarms, door
accessing systems, humidity sensors,
temperature sensors. All these components
decrease the possibility of a computer to be stolen
or damaged by humans and environment itself.
People having access to computer systems should
have their own user id with password protection.
Monitors should be screen saver protected to hide
the information from being displayed when the
user is away or inactive.
CONTINUE..
Secure your network especially wireless,
passwords should be used.
Internet equipment as routers to be protected
with password.
Data that you use to store information which can
be financial, or non-financial by encryption.
Information should be protected in all types of its
representation in transmission by encrypting it.
QUESTION
To Hide Information Inside A Picture, What
Technology Is Used?
Rootkits
Bitmapping
Steganography
Image Rendering
APPROACHES TO INFORMATION SECURITY
IMPLEMENTATION
Information security, or infosec, refers to data
security — one component of a larger
cybersecurity plan that takes proactive steps to
protect data. Key areas of an infosec program
include controlling who can access what data,
what level of access each authorized person is
given, employee training, and accommodations
for your specific data needs.
An infosec program is necessary for any company
responsible for managing personal or client data,
including healthcare facilities, financial
institutions, utility businesses, property
managers, and schools. In some countries and
industries, data protection is legally required.
CONTINUE..
In order to determine the safety of data from
potential violations and cyber-attacks, the
implementation of the security model has an
important phase to be carried out. In order to
ensure the integrity of the security model can be
designed using two methods:
1. BOTTOM-UP APPROACH:
The company’s security model is applied by
system administrators or people who are working
in network security or as cyber-engineers.
The main idea behind this approach is for
individuals working in this field of information
systems to use their knowledge and experience in
cybersecurity to guarantee the design of a highly
secure information security model.
CONTINUE..
Key Advantages –
An individual’s technical expertise in their field
ensures that every system vulnerability is
addressed and that the security model is able to
counter any potential threats possible.
Disadvantage –
Due to the lack of cooperation between senior
managers and relevant directives, it is often not
suitable for the requirements and strategies of
the organisation.
2. TOP-DOWN APPROACH:
This type of approach is initialized and initiated
by the executives of the organization.
They formulate policies and outline the procedures to
be followed.
Determine the project’s priorities and expected
results
Determine liability for every action needed
Analysis
Hacktivism
Exploitation
SECURITY SERVICES:
A processing or communication service that enhances
the security of the data processing systems and the
information transfers of an organization.
These services are intended to counter security
attacks, and they make use of one or more security
mechanisms to provide the service.
The following basic security services are
confidentiality, integrity, authentication, source
authentication, authorization and non-repudiation.
A range of cryptographic and non-cryptographic tools
may be used to support these services. While a single
cryptographic mechanism could provide more than
one service, it cannot provide all services.
CONTINUE..
Services
CONTINUE..
What Is The Most Important Activity In System
Hacking?
Information Gathering
Cracking Passwords
Escalating Privileges
Covering Tracks
1. CONFIDENTIALITY
When preventing disclosure of information to
unauthorized parties is needed, the property of
confidentiality is required.
Cryptography is used to encrypt the information
to make it unintelligible to everyone but those
who are authorized to view it.
To provide confidentiality, the cryptographic
algorithm and mode of operation needs to be
designed and implemented in such a way that an
unauthorized party will be unable to determine
the keys that have been associated with the
encryption or have the ability to derive the
information without using the correct keys.
2. DATA INTEGRITY
Data integrity provides assurance that data has
not been modified in an unauthorized manner
after it was created, transmitted, or stored.
This means that there has been no insertion,
deletion or substitution done with the data.
Digital signatures or message authentication
codes are cryptographic mechanisms that can be
used to detect both accidental modifications that
might occur because of hardware failure or
transmission issues and deliberate modifications
that might be performed by an adversary.
3. AUTHENTICATION
Cryptography can provide two types of
authentication services:
Integrity authentication can be used to verify
that non-modification has occurred to the data.
Source authentication can be used to verify the
identity of who created the information, such as
the user or system.
Digital signatures or message authentication
codes are used most often to provide
authentication services.
Key-agreement techniques might also be used to
provide this service.
4. AUTHORIZATION
Authorization provides permission to perform a
security function or activity.
This security service is often supported by a
cryptographic service.
Authorization is generally granted after the
successful execution of a source authentication
service.
5. NON-REPUDIATION
In key management, the term non-repudiation
refers to the binding of a certificate subject
through the use of digital signature keys and
digital certificates to a public key.
When non-repudiation is required for a digital
signature key, it means that the signature that
has been created by that key has the support of
both the integrity and source authentication
services of a digital signature.
CONTINUE..
The digital signature may also indicate a
commitment by way of the certificate subject in
the same manner that a document with a
handwritten signature would.
However, here are many aspects to be considered
in making a legal decision regarding non-
repudiation and this cryptographic mechanism is
considered only one element to be used in that
decision.
6. SUPPORT SERVICES
Supporting services are often required for the
above basic cryptographic security services.
As an example, a cryptographic service will often
require services for key establishment and
random number generation as well as protection
of the cryptographic keys themselves.
QUESTION
Phishing is a form of
Impersonation
Spamming
Identify Theft
Scanning
7. COMBINING SERVICES
Combination of the above six security services is
strongly advised.
When designing a secure system, designers
usually begin by determining which security
systems are required to protect the information
that will be contained and processed by the
system.
Once the services have been determined, the
mechanisms that will best provide these services
are considered.
8. MANAGING THE KEYS
The correct management of cryptographic keys is
essential to the level of security that might be
achieved in a system through cryptography. This
achievable security depends on various factors
such as the architecture of the cryptographic
system or the applied mix of mechanisms and
their intrinsic robustness against attacks.
INFORMATION SECURITY POLICY
An Information Security Policy (ISP) is a set of
rules that guide individuals when using IT
assets. Companies can create information
security policies to ensure that employees and
other users follow security protocols and
procedures. Security policies are intended to
ensure that only authorized users can access
sensitive systems and information.
Creating an effective security policy and taking
steps to ensure compliance is an important step
towards preventing and mitigating security
threats.
CONTINUE..
To make your policy truly effective, update it
frequently based on company changes, new
threats, conclusions drawn from previous
breaches, and changes to security systems and
tools.
Make your information security strategy
practical and reasonable. To meet the needs and
urgency of different departments within the
organization, it is necessary to deploy a system of
exceptions, with an approval process, enabling
departments or individuals to deviate from the
rules in specific circumstances.
INFORMATION SECURITY THREATS
There are hundreds of categories of information
security threats and millions of known threat
vectors. Below are some of the key threats that
are a priority for security teams at modern
enterprises.
1. UNSECURE OR POORLY SECURED
SYSTEMS
The speed and technological development often
leads to compromises in security measures. In
other cases, systems are developed without
security in mind, and remain in operation at an
organization as legacy systems. Organizations
must identify these poorly secured systems, and
mitigate the threat by securing or patching them,
decommissioning them, or isolating them.
2. SOCIAL MEDIA ATTACKS
Many people have social media accounts, where
they often unintentionally share a lot of
information about themselves. Attackers can
launch attacks directly via social media, for
example by spreading malware via social media
messages, or indirectly, by using information
obtained from these sites to analyze user and
organizational vulnerabilities, and use them to
design an attack.
QUESTION
The first computer virus is
(A) The famous
(B) HARLIE
(C) PARAM
(D) Creeper
3. SOCIAL ENGINEERING
Social engineering involves attackers sending
emails and messages that trick users into
performing actions that may compromise their
security or divulge private information. Attackers
manipulate users using psychological triggers
like curiosity, urgency or fear.
Because the source of a social engineering
message appears to be trusted, people are more
likely to comply, for example by clicking a link
that installs malware on their device, or by
providing personal information, credentials, or
financial details.
CONTINUE..
Organizations can mitigate social engineering by
making users aware of its dangers and training
them to identify and avoid suspected social
engineering messages. In addition, technological
systems can be used to block social engineering
at its source, or prevent users from performing
dangerous actions such as clicking on unknown
links or downloading unknown attachments.
4. MALWARE ON ENDPOINTS
Organizational users work with a large variety of
endpoint devices, including desktop computers,
laptops, tablets, and mobile phones, many of
which are privately owned and not under the
organization’s control, and all of which connect
regularly to the Internet.
A primary threat on all these endpoints is
malware, which can be transmitted by a variety
of means, can result in compromise of the
endpoint itself, and can also lead to privilege
escalation to other organizational systems.
CONTINUE..
Traditional antivirus software is insufficient to
block all modern forms of malware, and more
advanced approaches are developing to securing
endpoints, such as endpoint detection and
response (EDR).
5. LACK OF ENCRYPTION
Encryption processes encode data so that it can
only be decoded by users with secret keys. It is
very effective in preventing data loss or
corruption in case of equipment loss or theft, or
in case organizational systems are compromised
by attackers.
Unfortunately, this measure is often overlooked
due to its complexity and lack of legal obligations
associated with proper implementation.
Organizations are increasingly adopting
encryption, by purchasing storage devices or
using cloud services that support encryption, or
using dedicated security tools.
QUESTION
The first PC virus was developed in
(A) 1980
(B) 1986
(C) 1988
(D) 1999
6. SECURITY MISCONFIGURATION
Modern organizations use a huge number of
technological platforms and tools, in particular
web applications, databases, and Software as a
Service (SaaS) applications, or Infrastructure as
a Service (IaaS) from providers like Amazon Web
Services.
Enterprise grade platforms and cloud services
have security features, but these must be
configured by the organization.
CONTINUE..
Security misconfiguration due to negligence or
human error can result in a security breach.
Another problem is “configuration drift”, where
correct security configuration can quickly become
out of date and make a system vulnerable,
unbeknownst to IT or security staff.
Organizations can mitigate security
misconfiguration using technological platforms
that continuously monitor systems, identify
configuration gaps, and alert or even
automatically remediate configuration issues
that make systems vulnerable.