Professional Documents
Culture Documents
INFORMATION SECURITY
Learning Objectives:
At the end of the module, the students are expected to:
Define the terms information security
Identify reasons why it is very difficult to defend software attacks.
INTRODUCTION
This module will explain the concepts and principles of Information security, list out the
challenges of securing information, help you to identify the IT assets that are to be protected,
explain the various threats, vulnerabilities and issues in Information Security and teach you
how to solve these security issues.
Speed of attacks—with modern tools at their disposal, attackers can quickly scan
systems to find weaknesses and launch attacks with unprecedented speed. For example,
the Slammer worm infected 75,000 computers in the first 11 minutes after it was released,
and the number of infections doubled every 8.5 seconds. At its peak, Slammer was
scanning 55 million computers per second looking for another computer to infect.
Attackers can detect vulnerabilities more quickly and more readily exploit these
vulnerabilities— The number of newly discovered system vulnerabilities doubles
annually. This has resulted in an increasing number of zero-day attacks. While most
attacks take advantage of vulnerabilities that someone has already uncovered, a zero-day
attack occurs when an attacker discovers and exploits a previously unknown flaw.
Providing “zero days” of warning, a zero-day attack can be especially crippling to networks
and computers because the attack runs rampant while precious time is spent trying to
identify the vulnerability.
Most attacks are now distributed attacks, instead of coming from only one source -
Attackers can now use thousands of computers in an attack against a single computer or
network. This “many-against-one” approach makes it impossible to stop an attack by
identifying and blocking a single source.
User confusion— Increasingly, users are called upon to make difficult security decisions
regarding their computer systems, sometimes with little or no information to direct them.
Confidentiality
Integrity
Integrity refers to the ability to prevent our data from being changed in an unauthorized or
undesirable manner. This could mean the unauthorized change or deletion of our data or
portions of our data, or it could mean an authorized, but undesirable, change or deletion of
our data. To maintain integrity, we not only need to have the means to prevent unauthorized
changes to our data but also need the ability to reverse authorized changes that need to be
undone.
Availability
The final leg of the CIA triad is availability. Availability refers to the ability to access our data
when we need it. Loss of availability can refer to a wide variety of breaks anywhere in the
chain that allows us access to our data.
Categories of Attacks
Layering
Information security must likewise be created in layers, because one defense mechanism
may be relatively easy for an attacker to circumvent. Instead, a security system must have
layers, making it unlikely that an attacker has the tools and skills to break through all the
layers of defenses. A layered approach can also be useful in resisting a variety of attacks.
Layered security provides the most comprehensive protection.
Layered security, in an IT context, means protecting digital assets with several layers of
security. The concept behind layered security is simple. If a hacker manages to breach one
security measure, all sensitive data is still protected by the other layers of security that are in
place. This makes it harder for a hacker to perform a successful attack. In this layered
approach, each layer of security can work together to ensure enhanced protection against
threats.
Limiting
Limiting access to information reduces the threat against it. Only those who must use data
should have access to it. In addition, the amount of access granted to someone should be
limited to what that person needs to know. For example, access to the human resource
database for an organization should be limited to approve employees, including department
managers and vice presidents.
REFERENCES:
Online Reference
https://www.snia.org/sites/default/education/tutorials/2009/spring/security/EricHibbard-Introduction-Information-Assurance.pdf