ISS L1 Introduction
ISS L1 Introduction
Introduction to
Information Systems
Security
Lecture 1
Outline
1. Attack Examples
2. What is Information Systems Security?
3. ISS Objectives
4. Security terms
5. Security Policies
6. Conclusion
2
1. Attack Examples
4
Attack Examples
5
!Attack Examples - Consequences
1. Attack Examples
2. What is Information Systems Security?
3. ISS Objectives
4. Security terms
5. Security Policies
6. Conclusion
8
2. What is ISS?
◼ Information system
set of applications, services, information technology
assets, or other information-handling components
◼ Information Systems Security (ISS)
is the protection of information systems against
unauthorized access to or modification of information,
whether in storage, processing or transit, and against
the denial of service to authorized users, including those
measures necessary to detect, document, and counter
such threats.
9
What is ISS?
11
Outline
1. Attack Examples
2. What is Information Systems Security?
3. ISS Objectives
4. Security terms
5. Security Policies
6. Conclusion
12
ISS Objectives
13
ISS Objectives
3. Availability
– property of being accessible and usable on
demand by an authorized entity.
– means: protection from disruption, intentional
deletion, …
15
ISS Objectives
◼ Other Objectives:
4. Authenticity
◼ property that an entity is what it claims to be
5. Non-repudiation
◼ preventing the denial of previous commitments
or actions
6. Accountability
◼ the ability to identify entities responsible for past
actions.
17
Outline
1. Attack Examples
2. What is Information Systems Security?
3. ISS Objectives
4. Security terms
5. Security Policies
6. Conclusion
18
4. Security Terms
◼ Vulnerabilities: Examples
– Unprotected data under transmission
– Mistakes in firewall or router
– Software bugs exist.
– Passwords posted near the computer
◼ Threats: Examples
– Virus
– Illegal Passwords use
– Illegal access to the Internet
– Pretending to be a desk helper
20
Security terms
23
Types of Attack
◼ Masquerade or spoofing
– Spurious information is inserted into the system or
network by making it appears as if it is from a
legitimate entity.
◼ Repudiation
– False denial that an entity created something.
◼ Traffic analysis
– Monitoring traffic in order to get information about
exchanged data (regardless the content itself)
◼ Replay attack
– Intercepting a message in order to re-send it later
24
Countermeasures
25
Security terms - Relationships
26
ISS- another definition
29
Security Lifecycle
- develop sec policy
Analyze - Draw blueprints
- Determine sec requirements (objectives)
- Analyze threats, vulnerabilities (i.e., risks)
- Design architecture,
Design
- Choose countermeasures
- Continue developing sec policy
- Implement countermeasures
Implement - Test
- Carry out training and awareness
Operate - Monitor
- review
30
6. Conclusion
◼ Security terms
– ISS
– Security objectives
– Security Policy
– Vulnerabilities and Threats,
– Security measures
◼ Next lectures:
– Covering these terms in detail
31
Questions?
32
Case Study 1 – Hospital system
33
Case Study 2 – Online bank
34