Week 04-Ch04 InformationSecurity
Week 04-Ch04 InformationSecurity
• Ethics
• Definition
• Dilemmas
• Ethical Standards (5) for Corporations
• Opt-in/out for Informed Consent
• Privacy
• Areas of Concern
• Principles of Collection, Disclosure, and Usage
• Acts – PIPEDA and PHIPA
• Good Security Good Privacy
• How much electronic surveillance is too much?
Security
In the early 1980’s the US DoD released the Trusted Computer System Evaluation
Criteria.
This book had an orange cover and became known as the Orange Book.
Based largely on the Multilevel Security model developed by Bell and
LaPadula
Canada, France, Germany, the United Kingdom and the United States agreed on a
Common Criteria for Trusted Computers in 1998
Standards
Standardization Today:
• The National Institute of Standards & Technology (NIST)
Health Insurance Portability & Accountability Act (HIPAA)
1996
HIPAA established a national standard for the security of electronic health information,
including the protection of individually identifiable health information, the rights granted to
individuals, breach notification requirements, and the role of the OCR (Office for Civil
Rights)
• Internal Standards
Each enterprise has specific requirements to control risks and guard against liabilities
that are unique to their business or industry
Security
Information Security
Security
• The traditional CIA Triad is expanded to
the 3 dimensions of Cybersecurity
Called the Cybersecurity Cube, or
cybersecurity sorcery cube
Course of Actions
• Prevention
• Detection
• Response
• Recovery
Secure Communication
Classical Cipher
Simple Substitution
• Straight exchange of one character/byte for another using a
predetermined mapping
• E.g.: A B C D E… becomes W K M P D … thus CAB becomes MWK
• Mapping function is the crypto key
• Unique one-to-one character/byte substitution map
• Easy to break by looking for known patterns
Rotation Substitution
• Shifts every character a determined amount of spaces
• E.g. Caesar Cipher uses ROT-3, while Usenet uses ROT-13
• Using ROT-3, CAB becomes FDE
• Also unique one-to-one character/byte substitution
• Also very easy to break, using knowledge of letter patterns in languages
Secure Communication
Digital Substitution
Based on algebraic “Truth Tables”, developed by George Boole (1800’s)
Encryption using Boolean Exclusive OR (XOR) function
Encryption: Key XOR PlainText -> Ciphertext
Decryption: Key XOR Ciphertext -> PlainText
Example:
Encryption Decryption
21 bit key 21 bit key
+ C = 1000011
A = 1000001
0010000 0010011 0011010 are the same
- result is one (1) is compared
T = 1010100 bits are different
Symmetric Key
Asymmetric Key
Hash Function
No cipher key required – one-way encryption
• Fixed-length hash value is generated based on the plaintext
• Plaintext -> hash function -> ciphertext
• Plaintext, and length of plaintext, is not recoverable from ciphertext
• Hash cannot be deciphered back to plaintext, one-way hash
• Primary use is for message integrity
• Hash value provides a digital fingerprint of content, ensuring against
alteration
• Effective because of the low probability that 2 different plaintext messages
will generate the same hash value
• Also called message-digest or one-way encryption
• Examples: HMAC, MD2, MD4, MD5, RIPEMD-160, SHA-1
Introduction to Information Systems
Rainer, Prince, Sanchez-Rodriguez,
Splettstoesser Hogeterp, Ebrahimi
Canadian Fifth Edition
Chapter 4
Information Security
Think about:
• The importance of immediate response to software updates.
Is your computer on “automatic update”?
• How could your credit rating be affected by identity theft?
• Security
• Information security
• Threat
• Exposure
• Vulnerability
• Social engineering:
o An attack in which the perpetrator uses social skills to trick
or manipulate legitimate employees into providing
confidential company information such as passwords
• Example:
o Kevin Mitnick, famous hacker and former FBI’s most
wanted
• Adware
• Spyware
o Keyloggers, screen scrapers
• Spamware
• Cookies
o Tracking cookies
• Risk acceptance
• Risk limitation
• Risk transference
Consider:
• What are the resources required to carefully investigate
a data breach?
• The seriousness of the consequences for individuals
who leak or sell confidential data
• Categories of Controls
• Physical Controls
• Access Controls
• Communication Controls
• Business Continuity Planning
• Information Systems Auditing
Ref: https://fidoalliance.org/overview/history/
Copyright ©2021 John Wiley & Sons Canada, Ltd. 54
HOW FIDO AUTHN WORKS
The user authenticates The device authenticates the
“locally” to their device by user online using public key
various means cryptography
LOCAL ONLINE
AUTHENTICATOR
1 2 3
?
Authentication Challenge Biometric Verification* Authenticated Online
1 2 3
• Firewalls
• Anti-malware systems
• Whitelisting and blacklisting
• Encryption
• Virtual private networking
• Transport layer security (TLS)
• Employee monitoring systems
• BCP’s purpose:
o Provide continuous availability
o Be able to recover in the event of a hardware or software
failure or attack (e.g., due to ransomware)
o Ensure that critical systems are available and operating
• IF Function
USED WHEN YOU NEED TO MAKE A CHOICE
• VARIABLE TAX RATE - MORE EARNINGS MEANS HIGHER TAX
• CALCULATE COMMISSION PAID ON EMPLOYEE SALES
• DISPLAY MESSAGES WHEN
• STOCK NEEDS REFILLING
• YOU HAVE A PROFIT OR LOSS
• =IF(G7<=300,0.15,0.2)
• SYNTAX - IF(CONDITION, RESULT IF TRUE, RESULT IF FALSE)
• CAN BE READ “IF THE CONTENTS OF G7 ARE LESS THAN 300, USE THE 15% TAX RATE,
OTHERWISE USE THE 20% TAX RATE”
• VALUES OF 15% OR 20% CAN BE USED IN FORMULAS AND FUNCTIONS
Excel 3
• Goal Seek