Is - Self Study
Is - Self Study
Security Concepts
Attack Vs Threat
A threat is a “potential” violation of security
◼ The violation need not actually occur
◼ The fact that the violation might occur makes it a threat
◼ It is important to guard against threats and be prepared for
the actual violation
Security Goals
Security Goals
Security Goals
Security Goals
Accountability:
Ensuring that an entity’s action is traceable uniquely to that entity
Security Assurance:
Assurance that all above objectives are met
Information Security INTRODUCTION
Security Attacks
Threats
Attack on Attack on
Availability Confidentiality
Attack on
Attack on
Authenticity
Integrity
Masquerading
spoofing
Information Security INTRODUCTION
Security Attacks
Security Attacks
Security Attacks
Passive attacks:
Eavesdropping on, or monitoring of, transmissions to:
Obtain message contents, or
Monitor traffic flows
Active attacks:
Modification of data stream to:
Masquerade of one entity as some other Fabrication
Security Attacks
Passive attacks
Obtaining Traffic
message contents Analysis
❖ Wiretapping
❖ Port Scanning
❖ Traffic analysis
❖ Eavesdropping
Information Security INTRODUCTION
Security Attacks
Passive attacks
Information Security INTRODUCTION
Security Attacks
Active attacks
❑ Social Engineering
❑ DoS
❑ Spoofing
❑ DDoS
❑ ARP Poisoning
❑ Flooding
❑ Man in the Middle
❑ Smurf
❑ Overflows
❑ PoD
❑ Exploits
❑ Mail bombs
❑ And a lot more
Information Security INTRODUCTION
Security Attacks
Active attacks
Information Security INTRODUCTION
Requirements
& Policies
Information
Security
Features Assets
or
Services
Attackers
Security
Mechanisms
Security Architecture
Information Security INTRODUCTION
Types of Security
Public
Security
Information Security INTRODUCTION
Computer Security:
Measures to protect data stored on a computer
Network Security:
Measures to protect data during their transmission
Internet Security:
Measures to protect data during their transmission over a
collection of interconnected networks
Network Security
Yahoo etc.
Security
Network Security Model
Security
Protecting information against malicious or accidental
access plays an important role in information-based
economies/societies
Few application areas:
Banking:
Online banking, PIN protocols, digital cash
Economy:
Mobile phones, DVD players, Pay-per-View TV, computer games
Military:
IFF (Identification, friend or foe), secure communication
channels, weapon system codes
2008:
HSBC loses disks containing details of 180,000
policy holders (fined for a total of £3.2 million)
2007:
Hard disk containing records of 3 million candidates
for driver’s licenses goes missing not just happening
in the UK: Sunrise (Swiss ISP) exposes account
names and passwords of users in 2000
Information Security INTRODUCTION
Denial-of-Service attacks:
2009:
Twitter is hit by a denial-of-service attack and brought
to a standstill
Policy
◼ A policy is a general statement produced by senior
management that dictates what role security will play in
organization or what is acceptable and not acceptable
generally.
◼ Policies are usually broad documents that require
procedures to implement them.
Standards
◼ A standard refer to mandatory activities, actions or rules.
e.g. ISO 9001, ISO 27001 etc.
Information Security
Security Controls Administrative Controls
Baselines
◼ Baselines are also used to define the minimum level of
protection required.
◼ In security, specific baselines can be defined per system
type, which indicates the necessary settings and the
level of protection being provided
Guidelines
◼ Recommended actions and operational guides.
Information Security
Security Controls