0% found this document useful (0 votes)
16 views

ISRA Module 1 PPT 2

ISRA Module 1 ppt 2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views

ISRA Module 1 PPT 2

ISRA Module 1 ppt 2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 8

INFORMATION SECURITY

RISK ASSESSMENT AND


ASSURANCE

Module 1 – Introduction
Module I: Introduction
History,
What is Information Security?,
Critical Characteristics of Information,
Components of an Information System,
NSTISSC Security Model,
Securing the Components,
Balancing Security and Access.
History of Information security
 History of Information security

 The history of information security is a fascinating journey that spans centuries
and has evolved in response to the changing technological landscape.

 key milestones in the history of information security:



 Ancient Ciphers:

 The earliest recorded use of cryptography dates back to ancient civilizations
such as the Egyptians, who used simple substitution ciphers to protect messages
on papyrus.
 The Greeks employed the scytale, a rod-based transposition cipher, to secure
military communications.

 Caesar Cipher:

 Julius Caesar is often credited with the development of the Caesar cipher, a type
of substitution cipher, where each letter in the plaintext is shifted a certain
number of places down or up the alphabet.

History of Information security
 Middle Ages:

 During the Middle Ages, encryption techniques continued to evolve, and more complex ciphers
were developed.
 The use of secret keys and the principle of polyalphabetic substitution emerged.

 Renaissance:

 The Renaissance saw the invention of more sophisticated encryption machines, such as the Alberti
cipher disk, which allowed for more secure communication.
 Telegraph and Morse Code:

 The telegraph, invented in the 19th century, revolutionized long-distance communication. Morse
code, a system of encoding text into dots and dashes, was used to transmit messages securely over
telegraph wires.

 World War I and II:

 Both World Wars saw significant advancements in cryptography and cryptanalysis.
 The Enigma machine, used by the Germans during World War II, was famously cracked by Allied
cryptanalysts, leading to important intelligence gains.

 Post-World War II:

 The advent of computers brought about new challenges and opportunities in information security.
 Pioneers like Claude Shannon laid the foundation for modern cryptography and information
theory.

History of Information security
 1970s:

 The Data Encryption Standard (DES), developed by the U.S. National Institute of
Standards and Technology (NIST), became a widely used encryption standard.
 Public-key cryptography, with the RSA algorithm, was introduced by Whitfield
Diffie and Martin Hellman.

 1980s and 1990s:

 The development of the internet and electronic communication increased the
need for secure information exchange.
 Cryptographic protocols like SSL/TLS and PGP were developed to secure online
transactions and emails.

 2000s and Beyond:

 Cybersecurity became a critical concern with the proliferation of digital
information and the rise of cyberattacks.
 New encryption methods and security technologies continued to evolve to
counter emerging threats.
 Compliance standards like PCI DSS and GDPR were established to regulate
information security practices.

History of Information security
Present Day:

Information security remains a dynamic field, with
ongoing challenges related to data breaches, ransomware
attacks, and privacy concerns.
Emerging technologies like blockchain and quantum
computing have the potential to impact information
security significantly.

The history of information security reflects the constant
struggle between those seeking to protect sensitive
information and those attempting to exploit
vulnerabilities.
As technology continues to advance, information security
will remain a critical concern in our increasingly
interconnected world.
NSTISSC Model
NSTISSC (National Security Telecommunications
and Information Systems Security Committee)
Security Model

 The NSTISSC Security Model is a security framework used by the
United States government to assess and categorize the security of
information systems and networks.

 It is specifically designed for the protection of national security
information. The NSTISSC Security Model is also commonly referred
to as the "Orange Book" because of the color of its cover.

 The NSTISSC Security Model consists of a set of security levels, each
with its associated security requirements and controls.

 These security levels are used to classify and evaluate the security
posture of information systems and networks.
NSTISSC Security Model

You might also like