Information Security 1.intro
Information Security 1.intro
CC3121-Information Security
Spring 2024
2
Instructor Contact Details
► The main objective of this course is to provide a detailed view to information security and
related topics.
► The students will learn about the technical as well as the management side of security in
computer systems.
► They will acquire knowledge about fundamental principles of security and also about practical
approaches to securing computer and network based systems.
► Moreover, students should be able to work on cryptography, digital signature, security and
privacy policies and able to define legal aspects in information security.
4
Security Motivation Factors
► Avoiding negligence
► The protection of information and its critical elements, including systems and
hardware that use, store, and transmit that information
► Necessary tools: policy, awareness, training, education, technology
► C.I.A. triangle
► Was standard based on confidentiality, integrity, and availability
► Now expanded into list of critical characteristics of information
16
Motivation
Credit card fraud is a recurring theme, ranges from spying out PINs at ATMs to organized
stealing and trading of credit card numbers
High profile case:
• In the U.S. Albert Gonzalez and other hackers infiltrated Heartland and Hannaford
(two firms processing payments)
They stole more than 170 million credit card numbers between 2005 and 2007
This has cost Heartland approximately $140 million
22
Typical Cases of Security Lapses (cont’d.)
►Denial-of-Service attacks:
► 2009: Twitter is hit by a denial-of-service attack and brought to a standstill
► Natural disasters (cause needs not be malicious): Data loss through fire,
storm, flooding
► 2005: Hurricane Katrina takes out two data centers of an aerospace company
in the U.S.; unfortunately, they backed each other up
26
Home Task
► Following contents will be covered throughout the semester in week wise lectures:
► Basic notions of confidentiality, integrity, availability; authentication models; protection
models; security kernels; Encryption, Hashing and Digital Signatures; audit; intrusion
detection and response; database security, host based and network-based security issues
operational security issues; physical security issues; personnel security; policy formation
and enforcement; access controls; information flow; legal and social issues;
identification and authentication in local and distributed systems; classification and trust
modeling; risk assessment
29
Reference Material