Chapter -01 Is
Chapter -01 Is
FOUNDATIONS
INTRODUCTION TO
INFORMATION
Information Security: SECURITY
Definition: Protecting information from
unauthorized access, disclosure, alteration, and
destruction.
Goals:
Confidentiality: Ensuring only authorized access.
Integrity: Maintaining data accuracy.
Availability: Ensuring information is accessible
when needed.
Example:
Target Data Breach (2013): A case where credit
card information was stolen due to inadequate
THREATS AND
VULNERABILITIES
Threats:
Malware: Viruses, Worms.
Phishing: Deceptive emails to steal credentials.
Vulnerabilities:
Weak Passwords: Easily guessable or reused.
Unpatched Software: Outdated systems prone to exploitation.
Example:
Phishing attacks leading to data breaches (e.g., recent
corporate attacks).
SECURITY DESIGN
PRINCIPLES
Core Principles of Security Design
Least Privilege: Users should have only the access they need.
Defense in Depth: Multiple layers of security controls.
Fail-Safe Defaults: Default to the most secure state.
Example:
Comparison between secure and insecure system designs (e.g., a well-protected
network vs. an open network).
CORE PRINCIPLES OF
SECURITY DESIGN
Open Design Principle:
Security should not rely on secrecy. Instead, systems
should remain secure even when their design is public.
Transparency allows for scrutiny, leading to improvements.
Example:
Linux (Open-Source): Its code is publicly available,
allowing experts to find and fix vulnerabilities, making it
highly secure.
Closed-Source Software: Relies on secrecy, potentially
leaving vulnerabilities unaddressed until discovered by the
vendor.
SECURITY MECHANISMS
Essential Security Mechanisms
Asymmetric Encryption:
Uses a pair of keys—a public key for encryption and a private key for decryption.
Pros: Simplifies key distribution and enhances security.
Cons: Generally slower and less efficient for large data volumes.