Lecture#1 - Intro To Info Sec
Lecture#1 - Intro To Info Sec
01 | Sikandar Abbasi
Administrative Matters
Textbook
Principles of Information Security, 6th edition by M. Whitman and H. Mattord, 2017.
References Material:
Computer Security: Principles and Practice, 4th edition by William Stallings, 2017.
Computer Security, 3rd edition by Dieter Gollmann, 2011.
Computer Security Fundamentals, 3rd edition by William Easttom, 2016.
01 | Sikandar Abbasi
GRADING SYSTEM AND WEIGHTAGES OF ASSESSMENTS
Relative grading system will be followed to award grades. Weightages are as under :
Assignments =8%
Quizzes =8%
Presentations =4%
Mid Semester Examination = 30 %
End Semester Examination = 50 %
01 | Sikandar Abbasi
OTHER RULES
Instructors:
01 | Sikandar Abbasi
What is an Information System?
01 | Sikandar Abbasi
Introduction to Information Security
Definition:
Information Security involves protecting data and information systems from
Unauthorized access
Use
Disclosure
Disruption
Modification
Destruction
Information security is about ensuring that data is safe from attacks, leaks, and unauthorized
access.
Modern Relevance: The increasing dependence on information technology means increased risks –
there is a clear increase in incidents such as data breaches, fraud, and the spread of malicious code.
01 | Sikandar Abbasi
Introduction to Information Security
Key Terminologies:
Asset: What is being protected (e.g., data, networks).
Vulnerability: Weakness that can be exploited.
Threat: Potential cause of an unwanted incident.
01 | Sikandar Abbasi
SECURITY PRINCIPLES
Security Goals
Detective: Identify security incidents or vulnerabilities, methods to detect security
breaches (e.g., IDS, SIEM).
Preventive: Stop threats from impacting systems (e.g., firewalls, encryption).
Corrective: React to incidents and recover, actions to fix security breaches (e.g.,
backup, patch management).
Layered Security: The idea that multiple layers of defense (people, processes, and
technology) protect data and systems. Firewalls + Antivirus + User training.
01 | Sikandar Abbasi
SECURITY PRINCIPLES
Authentication:
The process of verifying the identity of a user or system.
Common methods: passwords, biometrics, multi-factor authentication (MFA).
Importance of strong password policies and MFA.
Authorization:
Determines what an authenticated user is allowed to do.
Access control models
Discretionary Access Control (DAC): Owners control access to resources.
Role-Based Access Control (RBAC): Access is based on user roles.
Mandatory Access Control (MAC): Access based on security clearances.
01 | Sikandar Abbasi
SECURITY PRINCIPLES
Accountability:
Ensures that actions can be traced back to the responsible party.
Logging and auditing: Keeping records of activities.
Importance in compliance (GDPR, HIPAA).
Non-repudiation:
The ability to prove that someone performed an action (e.g., sent a message,
completed a transaction).
Digital signatures: Provide proof that a message was sent by a specific
person
Hashing: Generates a unique identifier for data to ensure it hasn't been
altered.
01 | Sikandar Abbasi
SECURITY PRINCIPLES
Risk Management:
Identifying, assessing and mitigating security risks.
Steps:
Risk identification: Identify vulnerabilities
Risk assessment: Evaluate the likelihood and impact of threats
Risk control: Implement measures to mitigate or manage risks (e.g.,
encryption, access controls).
Methods:
Accept
Avoid
Transfer
Mitigate risks
01 | Sikandar Abbasi
CIA TRIAD
The CIA Triad is the foundation of information security. It represents three key
principles:
– Confidentiality
– Integrity
– Availability
01 | Sikandar Abbasi
CONFIDENTIALITY
01 | Sikandar Abbasi
CONFIDENTIALITY
Confidentiality Threats:
Data breaches: Unlawful access to personal or confidential information.
Social engineering: Manipulating people into disclosing sensitive information
(e.g., phishing attacks)
Phishing: Attackers trick users into revealing sensitive information
Mitigation:
Strong access controls, encryption, MFA, data masking.
Training employees on recognizing phishing attacks and other social engineering
techniques.
01 | Sikandar Abbasi
INTEGRITY
Definition: Ensuring the accuracy, consistency, and trustworthiness of data over its
lifecycle.
01 | Sikandar Abbasi
INTEGRITY
Integrity Threats:
Data Tampering: Unauthorized alteration of data (e.g., man-in-the-middle attacks)
Malware: Ransomware and viruses that modify data
Man-in-the-Middle Attacks: Intercept and alter communications between two
parties.
Mitigation:
Regular data backups
Use of cryptographic checksums (e.g., MD5, SHA) to ensure data integrity
Intrusion detection systems (IDS) and file integrity monitoring
01 | Sikandar Abbasi
AVAILABILITY
Definition: Ensuring that authorized users have reliable access to information and resources
when needed.
01 | Sikandar Abbasi
AVAILABILITY
Availability Threats:
Denial of Service (DoS) Attacks: Overloading systems to make them
unavailable to legitimate users.
Hardware/Software Failures: Natural disasters, human error, or technical failures
leading to outages.
Mitigation:
Load balancing and failover systems.
Data centers and cloud solutions with high uptime guarantees (99.9%+).
Implementing regular maintenance schedules and system monitoring.
01 | Sikandar Abbasi
RELATIONSHIP BETWEEN THE CIA TRIAD
Interconnection: Each principle supports the others. For example, ensuring data
integrity and confidentiality contributes to data availability.
Balancing Security: You may need to trade off one principle against another (e.g., too
much security may reduce availability, and excessive availability may compromise
confidentiality)
01 | Sikandar Abbasi
CASE STUDIES
01 | Sikandar Abbasi
CASE STUDIES
01 | Sikandar Abbasi
CASE STUDIES
01 | Sikandar Abbasi
SUMMARY AND CONCLUSION
Before we wrap up, let’s take a moment to revisit the key points we’ve covered today.
We began by exploring the fundamental security principles that drive information
security. Remember, these principles—authentication, authorization, and
accountability—form the backbone of a secure environment.
Authentication verifies who you are
Authorization determines what you can access
Accountability ensures that actions can be traced back to their source.
Together, these principles guide us in building systems that are protected from
unauthorized access and misuse.
01 | Sikandar Abbasi
SUMMARY AND CONCLUSION
Then, we moved into the heart of today’s discussion—the CIA Triad. We talked
about:
Confidentiality, which ensures that sensitive information stays private and is
only accessible to those who are authorized
Integrity ensures that the data we rely on is accurate, consistent, and unaltered
Availability ensures that systems and data are accessible to authorized users
when they need them
These three pillars are interconnected, and they must be balanced carefully.
Without one, the others suffer.
01 | Sikandar Abbasi
SUMMARY AND CONCLUSION
As we’ve seen, information security is not just an IT issue, it’s a business issue, a
legal issue, and in some cases, even a human rights issue. We live in an era
where the threat landscape is more complex and widespread than ever.
Cybercriminals are becoming more sophisticated, and the attacks we face are more
targeted.
In today’s world, every organization, big or small, needs to be vigilant. It’s not just
about protecting company assets—it’s about protecting customer trust. A single
breach can lead to devastating financial losses, legal liabilities, and damage to
reputation that’s difficult to recover from.”
01 | Sikandar Abbasi
THANK YOU