Lecture 01 - Introduction To Information Security
Lecture 01 - Introduction To Information Security
Introduction to
Information Security
Learning Outcome
• Identify the need for security in computing
• Identify issues in information security
• Describe different encryption and decryption algorithms and technologies
• Identify security requirements for operating systems, computer network,
databases and programs
• Evaluate various existing security solutions and standards
• Analyse strengths and weaknesses of different security design techniques
• Recognize legal issues related to security in computing
2
Introduction to Information
Security
Objective:
• Describe the formal definition of Computer Security and Information Security
• Describe Confidentiality, Integrity, and Availability as the key security
requirements
• Describe the security threats and attacks types
Recommended Texts
W. Stallings and L. Brown, “Computer Security, Principles and Practice, 2 nd
edition, Pearson, 2012, Chapter 1.
Supplementary text
Charles P. Pfleeger and Shari L. Pfleeger, Security in Computing (3rd edition).
Prentice-Hall. 2003. ISBN: 0-13-035548-8.
3
Computer Security
Definition (NIST Computer Security Handbook)
The protection afforded to an automated information
system in order to attain the applicable objectives of
preserving the integrity, availability, and confidentiality of
information system resources (includes hardware, software,
firmware, information/data, and telecommunications).
4
Information Security
(InfoSec)
5
CIA Triad
6
Confidentiality (C)
This term covers two related concepts.
•Data confidentiality : Assures that confidential information is not made
available or disclosed to unauthorized individuals.
•Privacy : Assures that the owners have control on:
What information related to them may be collected and stored,
By whom and to whom that information may be disclosed.
7
Integrity (I)
This term covers two related concepts.
•Data integrity: Information and programs are changed only in a
specified and authorized manner.
•System integrity: A system performs its intended function in an
unimpaired manner, and free from deliberate or inadvertent
unauthorized manipulation of the system.
8
Availability (A)
Systems work promptly and service is not denied to authorized users.
9
Additional Objectives
Authenticity: Able to verify that
•the users are who they claim they are, and
•the system receives data from a trusted source.
NIST includes authenticity as part of Integrity
10
Computer Security Model (RFC
2828)
1) System Resource or asset that needs to be protected
• Hardware: e.g., Computer System, data storage, communication devices.
• Software: e.g., operating systems, program utilities and applications.
• Data: e.g., data and password files, databases.
• Communication facilities and networks: e.g., LAN, WAN, routers, etc.
11
Computer Security Model
(cont.)
3) Threat is a possible danger that might exploit a vulnerability.
It represents a potential harm to the system resource.
12
Computer Security Model
(cont.)
5) Adversary is an entity that carried out an attack
◦ A threat agent or an attacker.
13
Exploits
An exploit is a piece of software, a chunk of data, or a sequence of
commands that takes advantage of a bug or vulnerability to cause
unintended or unanticipated behavior to occur on computer software,
hardware, or something electronic (usually computerized).
14
Vulnerability Assessment
A vulnerability assessment is the process of defining,
identifying, classifying and prioritizing vulnerabilities in
Information systems, applications and network
infrastructures and providing the organization doing the
assessment with the necessary knowledge, awareness and
risk background to understand the threats to its
environment and react appropriately.
15
Penetration Testing
Penetration testing (also called pen testing or ethical
hacking) is the practice of testing a Information system,
network or web application to find security vulnerabilities
that an attacker could exploit. The process involves
gathering information about the target before the test,
identifying possible entry points, attempting to break in
either virtually or for real and reporting back the findings.
Penetration testing can be automated with software
applications or performed manually.
16
Goal of Penetration Testing
• Identify weak spots in an organization's security posture
• Measure the compliance of its security policy
• Test the staff's awareness of security issues
• Determine whether and how the organization would be
subject to security disasters.
17
Passive Attacks
Passive attack is performed by eavesdropping or monitoring
data transmission
•The attacker only learns or makes use of information without
affecting system resources
•Passive attack is hard to detect because data is not altered
• Use attack prevention (not detection) to handle it
18
Active Attacks
Active attacks alters system resources or affecting their operations.
Active attack is difficult to prevent but easy to detect
Four categories of active attack:
•Replay. Capture and retransmit data unit to produce an unauthorized
effect
•Masquerade. One entity pretends to be another entity
• It usually includes other form of attack, e.g., replay
•Data modification. Alter some portion of legitimate data, delay the
data, or reorder the data to produce an unauthorized effect
•Denial of Service. Prevent or disallow the legitimate use of facilities
19
Inside attacks
Attack vectors can also originate from inside the network. An internal
user, such as an employee, can accidently or intentionally:
•Steal and copy confidential data to removable media, email, messaging
software, and other media.
•Compromise internal servers or network infrastructure devices.
•Disconnect a critical network connection and cause a network outage.
•Connect an infected USB drive into a corporate computer system.
Internal threats also have the potential to cause greater damage than
external threats because internal users have direct access to the
building and its infrastructure devices. Employees also have knowledge
of the corporate network, its resources, and its confidential data.
20
Outside attacks
Many attack vectors originate from outside the corporate network.
Outside attacks are performed by an unauthorized users.
•For example, attackers may target a network, through the Internet, in
an attempt to disrupt network operations and create a denial of service
(DoS) attack.
21
Computer Security Model
22