Information Security Lecture Notes 1
Information Security Lecture Notes 1
"Keeping anyone from doing things you do not want them to do to, with, on,
or from your computers or any peripheral devices".
Using this definition, computers are seen to be targets that can be attacked ("do
to"), or tools that can be used ("do . . . with, on, or from"). From this
perspective, computer security is distinguished from information security.
• 1.6.1 Confidentiality
Confidentiality is the concealment of information or resources. The
need for keeping information secret arises from the use of computers
in sensitive fields such as government and industry.
Access control mechanisms support confidentiality. One access control
mechanism for preserving confidentiality is cryptography, which
scrambles data to make it incomprehensible. A cryptographic key
controls access to the unscrambled data, but then the cryptographic
key itself becomes another datum to be protected.
Resource hiding is another important aspect of confidentiality.
1.6 Principles of Information Security
• 1.6.2 Integrity
Integrity refers to the trustworthiness of data or resources, and it is
usually phrased in terms of preventing improper or unauthorized
change. Integrity includes data integrity - the content of the
information - and origin integrity - the source of the data, often called
authentication.
The source of the information may bear on its accuracy and credibility
and on the trust that people place in the information.
Integrity mechanisms
• Prevention mechanisms seek to maintain the integrity of the data by
blocking any unauthorized attempts to change the data or any
attempts to change the data in unauthorized ways.
• Detection mechanisms do not try to prevent violations of integrity;
they simply report that the data’s integrity is no longer trustworthy.
Detection mechanisms may analyze system events (user or system
actions) to detect problems or (more commonly) may analyze the
data itself to see if required or expected constraints still hold.
1.6 Principles of Information Security
• 1.6.3 Availability
Availability refers to the ability to use the information or resource
desired. Availability is an important aspect of reliability as well as of the
system design because an unavailable system is at least as bad as no
system at all. The aspect of availability that is relevant to security is that
someone may deliberately arrange to deny access to data or to a service
by making it unavailable.
Attempts to block availability, (name this type of attack), can be the most
difficult to detect, because the analyst must determine if the unusual
access patterns are attributable to deliberate manipulation of resources
or of environment.
Computer security is not restricted to these three broad concepts. Additional ideas
that are often considered part of the taxonomy of computer security include:
• Access control -- Ensuring that users access only those resources and
services that they are entitled to access and that qualified users are not
denied access to services that they legitimately expect to receive.
• Nonrepudiation -- Ensuring that the originators of messages cannot deny
that they in fact sent the messages.
• Authentication -- Ensuring that users are the persons they claim to be.
• Privacy -- Ensuring that individuals maintain the right to control what
information is collected about them, how it is used, who has used it, who
maintains it, and what purpose it is used for.
Note:
• Privacy is a property of individuals;
• confidentiality is a property of data; and
• security is a property assigned to computer hardware and software
systems.
• What factors do you believe caused the judge to hand down the sentence he did?
• What would you have done were you the judge, and
• What extra information would you have needed to make your decision?
1.9 Self – Test Questions