Principles of Information Security Chapter 1
Principles of Information Security Chapter 1
Learning Objectives
Upon completion of this material, you should be
able to:
Define information security
Recount the history of computer security and how it
evolved into information security
Define key terms and critical concepts of information
security
Enumerate the phases of the security systems
development life cycle
Describe the information security roles of
professionals within an organization
Principles of Information Security, Fourth Edition
Introduction
Information security: a well-informed sense of
assurance that the information risks and controls
are in balance. Jim Anderson, Inovant (2002)
Security professionals must review the origins of
this field to understand its impact on our
understanding of information security today
The 1960s
Advanced Research Project Agency (ARPA) began
to examine feasibility of redundant networked
communications
Larry Roberts developed ARPANET from its
inception
10
MULTICS
Early focus of computer security research was a
system called Multiplexed Information and
Computing Service (MULTICS)
First operating system created with security as its
primary goal
Mainframe, time-sharing OS developed in mid1960s by General Electric (GE), Bell Labs, and
Massachusetts Institute of Technology (MIT)
Several MULTICS key players created UNIX
Primary purpose of UNIX was text processing
Principles of Information Security, Fourth Edition
11
Table 1-1 Key Dates for Seminal Works in Early Computer Security
Principles of Information Security, Fourth Edition
12
The 1990s
Networks of computers became more common; so
too did the need to interconnect networks
Internet became first manifestation of a global
network of networks
Initially based on de facto standards
In early Internet deployments, security was treated
as a low priority
13
2000 to Present
The Internet brings millions of computer networks
into communication with each othermany of them
unsecured
Ability to secure a computers data influenced by
the security of every computer to which it is
connected
Growing threat of cyber attacks has increased the
need for improved security
14
What is Security?
The quality or state of being secureto be free
from danger
A successful organization should have multiple
layers of security in place:
Physical security
Personal security
Operations security
Communications security
Network security
Information security
15
16
17
Access
Asset
Attack
Control, Safeguard, or
Countermeasure
Exploit
Exposure
Loss
Protection Profile or
Security Posture
Risk
Subjects and Objects
Threat
Threat Agent
Vulnerability
18
19
20
21
Availability
Accuracy
Authenticity
Confidentiality
Integrity
Utility
Possession
22
23
Software
Hardware
Data
People
Procedures
Networks
24
25
26
27
28
29
30
31
Investigation
What problem is the system being developed to
solve?
Objectives, constraints, and scope of project are
specified
Preliminary cost-benefit analysis is developed
At the end, feasibility analysis is performed to
assess economic, technical, and behavioral
feasibilities of the process
32
Analysis
Consists of assessments of:
The organization
Current systems
Capability to support proposed systems
33
Logical Design
Main factor is business need
Applications capable of providing needed services
are selected
34
Physical Design
Technologies to support the alternatives identified
and evaluated in the logical design are selected
Components evaluated on make-or-buy decision
Feasibility analysis performed
Entire solution presented to end-user
representatives for approval
35
Implementation
36
37
38
Investigation
Identifies process, outcomes, goals, and
constraints of the project
Begins with Enterprise Information Security Policy
(EISP)
Organizational feasibility analysis is performed
39
Analysis
Documents from investigation phase are studied
Analysis of existing security policies or programs,
along with documented current threats and
associated controls
Includes analysis of relevant legal issues that could
impact design of the security solution
Risk management task begins
40
Logical Design
Creates and develops blueprints for information
security
Incident response actions planned:
Continuity planning
Incident response
Disaster recovery
41
Logical Design
Module development
Ensure separation of domains and encapsulation.
Isolation of modules will make them more robust and
less dependent upon external entities.
Modules are single purpose self-reliant objects.
Modules can be viewed as abstractions whose
design is as simple as possible. Being single
purpose enhances simplicity and minimizes the
number of interfaces (attack possibilities)
42
Physical Design
Needed security technology is evaluated,
alternatives are generated, and final design is
selected
At end of phase, feasibility study determines
readiness of organization for project
43
Implementation
Security solutions are acquired, tested,
implemented, and tested again
Ensure that only a minimum of code is exposed and
vulnerable.
Ensure that only a minimum of code executes by default.
Ensure that only the minimum amount of code that is
needed to perform a task executes.
44
Fail-Safe/Fail-Secure 1
A fail-safe or fail-secure device is one that, in the event
of failure, responds in a way that will cause no harm, or at
least a minimum of harm, to other devices or danger to
personnel.
Fail-safe and fail-secure are similar but distinct concepts.
Fail-safe means that a device will not endanger lives or
properties when it fails. Fail-secure means that access or
data will not fall into the wrong hands in a failure.
Sometimes the approaches suggest opposite solutions.
For example, if a building catches fire, fail-safe systems
would unlock doors to ensure quick escape and allow
firefighters inside, while fail-secure would lock doors to
prevent unauthorized access to the building.
Principles of Information Security, Fourth Edition
45
46
47
Senior Management
Chief Information Officer (CIO)
Senior technology officer
Primarily responsible for advising senior executives
on strategic planning
48
Champion
Team leader
Security policy developers
Risk assessment specialists
Security professionals
Systems administrators
End users
49
Data Responsibilities
Data owner: responsible for the security and use of
a particular set of information
Data custodian: responsible for storage,
maintenance, and protection of information
Data users: end users who work with information to
perform their daily jobs supporting the mission of
the organization
50
Communities of Interest
Group of individuals united by similar
interests/values within an organization
Information security management and professionals
Information technology management and
professionals
Organizational management and professionals
51
52
Security as Art
No hard and fast rules nor many universally
accepted complete solutions
No manual for implementing security through entire
system
53
Security as Science
Dealing with technology designed to operate at
high levels of performance
Specific conditions cause virtually all actions that
occur in computer systems
Nearly every fault, security hole, and systems
malfunction are a result of interaction of specific
hardware and software
If developers had sufficient time, they could resolve
and eliminate faults
54
55
Summary
Information security is a well-informed sense of
assurance that the information risks and controls
are in balance
Computer security began immediately after first
mainframes were developed
Successful organizations have multiple layers of
security in place: physical, personal, operations,
communications, network, and information
56
Summary (contd.)
Security should be considered a balance between
protection and availability
Information security must be managed similarly to
any major system implemented in an organization
using a methodology like SecSDLC
Implementation of information security often
described as a combination of art and science
57
References
http://en.wikipedia.org/wiki/Fail-safe
58