You are on page 1of 6

Information Assurance & Security 1

Information assurance and security are related ⬡ Look for ways security can break, not reasons why
but separate concepts. it won’t.
“The terms are inherently linked and share an 2. Thinking like a DEFENDER –
ultimate goal of preserving the integrity of ⬡ Know what you’re defending, and against whom.
information.” ⬡ Weigh benefits vs. costs: No system is ever
completely secure.
⬡ “Rational paranoia!”
IAS was combined on two fields:
⬡ Information assurance, which focuses on ------- IAS CORE PRINCIPLES ------
ensuring the availability, integrity, authentication,
confidentiality, and non-repudiation of 1. AVAILABILITY- Refers to how users are
given access to sensitive information within
information and systems. These measures may
your enterprise’s infrastructure.
include providing for restoration of information
2. INTEGRITY- Ensures that information
systems by incorporating protection, detection,
remains in its original form; information
and reaction capabilities. remains true to the creators intent.
3. AUTHENTICATION- Security measures to
⬡ Information security, which centers on the establish the validity of a transmission,
protection of information and information message, or originator
systems from unauthorized access, use, 4. CONFIDENTIALITY- Ensures the
disclosure, disruption, modification, or disclosure of information only to those
destruction in order to provide confidentiality, person with authority to
integrity, and availability. see it.
5. NON-REPUDIATION- Assurance that the
Information Assurance vs. Information Security sender is provided with proof of a data
- Both disciplines involve a variety of similar issues, delivery and recipient is provided with proof
including risk management, cyber security, corporate of the sender’s identity, so that neither can
governance, compliance, auditing, business later deny having processed the data.
continuity, disaster recovery, forensic science,
security engineering, and criminology.
HOW PRINCIPLES OF INFORMATION
“Information assurance and security is the management
ASSURANCE HELP IN PRACTICE
and protection of knowledge, information, and data.”

SECURITY MINDSET a peculiar mix of curiosity and Every modern organization needs to understand
paranoia that turns life into a perpetual game of asking
“what if” questions, how to plan and execute a successful information
ex: 1. “What if my phone gets stolen?” (HAHAH relate). assurance system. All businesses deal with
sensitive information that could be
Consider the following scenarios that typify the disastrous if tampered with or destroyed, whether
mindset: intentionally or accidentally. Altered or stolen
- When you encounter a Web form that asks you to sensitive information can lead to social security
enter a number between “1” and “100”, you wonder or credit card numbers falling into
what would happen if you enter things like “101”, “- criminals’ hands, huge losses in both personal
1”, or “`);”. and global revenue, and many other damaging
consequences.
- You’ve researched how a garage door opener
So how do the principles of information
remote works because you were curious if others
assurance help avoid those disasters? Let’s take a
could open your garage door without permission. look at the recent hack of multiple high-profile
- When logging into your computer, you’ve Twitter accounts data breach as examples.
deliberately mistyped your username or password
just to see what happens.

TWO TYPES OF MINDSET IN IAS SECURITY LESSONS FROM


1. Thinking like an ATTACKER –
⬡ Understand techniques for circumventing HACKED TWITTER ACCOUNTS
security.
Information Assurance & Security 1
Although Twitter has not yet released the
exact details regarding how the attack
occurred, we do know that the starting point
was a “phone spear phishing attack.” That
phrasing could mean a number of different
things.

The hacker could have used caller ID


spoofing, for instance, to make it appear
that their phone calls came from a Twitter
internal support member.
Whatever the exact tactic they used, we
know that the cybercriminal eventually
managed to access the individual accounts
of multiple influential users. This
was accomplished both by obtaining
individual employee credentials and by
bypassing various network controls.

All 5 principles of information The system life cycle is a series of stages that
assurance were violated during this are worked through during the development of
attack: new information system. A lot of time and money
• NONREPUDIATION was compromised can be wasted if a system is developed that
because the hacker was able to appear as if doesn’t work properly or do exactly what is
they were Joe Biden, Elon Musk, and other required of it. A new system is much more likely
public figures. to be successful if it is carefully planned and
• Users who sent Bitcoins to the hacker did so developed.
because the INTEGRITY of this sensitive
information had been meddled with, and they
FEASIBILITY STUDY- 1st stage of the system life
believed the money would be directed to cycle. An investigation that is carried out by a
someone else. systems analyst to find out what the main
• Although there were numerous problems are with the existing system and if it is
AUTHENTICATION measures in place, the technically possible and cost -effective to solve
hacker was able to steal proof of identity through these problems by developing a computer
phishing and bypass other controls that allowed
them to reach the admin panel. based solution.
• The sensitive information in this case was too
Feasibility report contents:
AVAILABLE to outside users, and thus the
CONFIDENTIALITY usually assumed for private ⬡ A description of the existing system outlining
social media accounts was violated. what is being done and how it is being done;
Twitter has since recovered from the attack and
is working to strengthen its information ⬡ A set of problem statements describing
assurance practices. But all organizations can exactly what the problems are with the existing
learn from this and similar cyber attacks when system;
forming their information assurance plans.
Diligently considering and practicing the 5 ⬡ A set of system objectives which describe
principles of information assurance will help your what the new system must be able to do;
organization avoid disrupted business
operations, lost time and revenue, and damaged ⬡ A description of some alternative solutions;
customer relationships.
⬡ A description of the technical, economic, legal
and social factors that have been considered;
Information Assurance & Security 1
⬡ A recommended course of action. on the boundaries of what is
acceptable
ANALYSIS DURING the analysis stage systems - Erroneous (or exceptional) test data is
analysts investigate the existing system to used to check that a system can
identify exactly what the problems are with the identify data that is wrong and reject it
existing system.
TESTING USING NORMAL, EXTREME AND
Systems analysts will use a variety of fact- ERRONEOUS DATA
finding methods to gather information for
example:

Questionnaires, Interviews, Observation,


Examining documents

DESIGN - Alternative possible solutions are


identified, Alternative solutions evaluated, The
best solution is identified
MAINTENANCE A new information system may
A design specification is produced containing need to be changed due to:
information about:
- Change in needs of user.
- Input - Problems not found during testing.
- Output - Improvements required in the way the
- Data storage system works.
- User interface
THE SECURITY LIFECYCLE
- Backup and recovery procedures
- Security procedures

TEST PLAN TYPICAL FORMAT FOR A TEST PLAN

IMPLEMENTATION This stage involves: Setting The Security Lifecycle is a process that must be
up the system so that it matches the design continuously executed. It is an ongoing process
specification. Testing carried out using the plan that can help guide a security organization.
to make sure that all the parts of the system
IDENTIFY - The very first step in any security
work correctly with normal, extreme and
program is to know what it is that you are trying
erroneous data.
to protect.
- Normal test data is used to check that a
system can handle the sort of data that
would be expected during day -to -day Questions to consider when trying identifying
use. your enterprise resources.
- Extreme test data is used to check that
a system can cope with data that lies - Where are the assets physically located?
Information Assurance & Security 1

- Are they in a secured data center or have in place and the security you’ve recently
scattered about multiple office changed and updated.
locations?
- How many servers, firewalls and routers Specific Security Mechanisms
do you have?
- What flavor of OS is running on each ENCIPHERMENT- Is hiding or covering data
system? and can provide confidentiality. It makes use of
- What applications and services are mathematical algorithms to transform data into
running on each server? a form that is not readily intelligible.
- Who is the customer for each system? The transformation and subsequent recovery of
- Does the application support the HR, the data depend on an algorithm and zero or
finance or the marketing department? more encryption keys. Cryptography and
- What is the priority of the application? Steganography techniques are used for
- Is this a front end customer application enciphering.
or an internal, third tier application?
DATA INTEGRITY- The data integrity mechanism
ASSESS - Once all of your assets have been appends a short check value to the data which
identified and documented, the next step is to is created by a specific process from the
perform a thorough security assessment on said data itself. The receiver receives the data and
assets. This step covers all aspects of the check value. The receiver then creates a
assessment, from reviewing your current new check value from the received data and
processes and procedures to actually compares the newly created check value with
performing vulnerability scans. the one received. If the two check values match,
the integrity of data is being preserved. 6
Some of the items that should be examined
might be:
DIGITAL SIGNATURE- A digital signature is a
- Password and User Account Policies.
way by which the sender can electronically sign
- Review of User ids and Groups
the data and the receiver can electronically
- Review of Administrator or Root
verify it. The sender uses a process in which
accounts
the sender owns a private key related
- Review of web server configurations
to the public key that he or she has
- Review of what is being logged and who
announced publicly. The receiver uses the
has access to the logs.
sender's public key to prove the message is
- Trusted relationships with other servers
indeed signed by the sender who claims to
PROTECT - After assessing your network and have sent the message.
obtaining more granular information about it,
it’s important to protect your network by
AUTHENTICATION EXCHANGE- A mechanism
bringing systems up to speed with your
intended to ensure the identity of an entity by
previously established policy and standards.
means of information exchange. The two
This phase of the lifecycle is sometimes referred entities exchange some messages to prove their
to as the ‘mitigation’ phase, since the objective identity to each other. For example the three-
is to mitigate any risks identified during the way handshake in TCP.
assessment phase.
TRAFFIC PADDING- The insertion of bits into
MONITOR - The last step of the information gaps in a data stream to frustrate traffic analysis
security lifecycle is to monitor the security you attempts
Information Assurance & Security 1

ROUTING CONTROL- Enables selection of A stream cipher processes the input elements
particular physically secure routes for certain continuously, producing output
data and allows routing changes which means element one at a time, as it goes along.
selecting and continuously changing different
available routes between the sender and the Types of Cryptography
receiver to prevent the attacker from traffic -Secret Key Cryptography
analysis on a particular route. -Public Key Cryptography
-Hash Functions
NOTARIZATION- use of a trusted third party to
control the communication between the 1. Secret Key Cryptography or
two parties. It prevents repudiation. The Symmetric cryptography
receiver involves a trusted third party to
store the request to prevent the sender
from later denying that he or she has
made such a request.

ACCESS CONTROL- A variety of mechanisms are


used to enforce access rights to resources/data
owned by a system, for example, PINS, and
passwords.

CRYPTOGRAPHY- the study of secure


 It uses a single key to encrypt data.
communications techniques that allow only the  Both encryption and decryption in
sender and intended recipient of a message to symmetric cryptography use the
view its contents. The term is derived from the same key, making this the easiest
Greek word kryptos, which means hidden. form of cryptography.
 The cryptographic algorithm utilizes
3 independent dimensions: the key in a cipher to encrypt the
Type of operations used for transforming plain data, and
text to cipher text when the data must be accessed
All the encryption algorithms are abased on two again, a person entrusted with the
general principles: secret key
substitution, in which each element in the can decrypt the data.
plaintext is mapped into another element,  Secret Key Cryptography can be
and transposition, in which elements in the used on both in-transit and at-rest
plaintext are rearranged. data, but is commonly only used on
The number of keys used
at-rest data, as sending the secret to
If the sender and receiver uses same key then it
the recipient of the message can
is said to be symmetric key (or) single key (or)
conventional encryption. If the sender and lead to compromise.
receiver use different keys then it is said to be
public key encryption.
The way in which the plain text is processed Examples:
A block cipher processes the input and block of ⬡ AES
elements at a time, producing output block for ⬡ DES
each input block. ⬡ Caesar Cipher
Information Assurance & Security 1

3. Hash Functions
 Are irreversible, one-way functions
which protect the data, at the cost
2. Public Key Cryptography of not being able to recover the
original message.
 Hashing is a way to transform a
given string into a fixed length
string. A good
hashing algorithm will produce
unique outputs for each input given.
 The only way to crack a hash is by
trying every input possible, until you
get the exact same hash.
 A hash can be used for hashing data
(such as passwords) and in
certificates.
 It uses two keys to encrypt data.
 One is used for encryption, while the Hash Functions some of the most
famous hashing algorithms are:
other key can decrypts the message.
 Unlike symmetric cryptography, if one
key is used to encrypt, that same key ⬡ MD5
cannot decrypt the message, rather the
other key shall be used.
⬡ SHA-1
 One key is kept private, and is called ⬡ SHA-2 family which includes SHA-224,
the “private key”, while the other is SHA-256, SHA-384, and SHA-512
shared publicly and can be used by ⬡ SHA-3
anyone, hence it is known as the “public ⬡ Whirlpool
key”.
 The mathematical relation of the keys is ⬡ Blake 2
such that the private key cannot be ⬡ Blake 3
derived from the public key, but the
public key can be derived from the
private.
 The private key should not be
distributed and should remain with the
owner only. The public key can be given
to any other entity.

Examples:
⬡ ECC
⬡ Diffie-Hellman
⬡ DSS

You might also like