Professional Documents
Culture Documents
1
“The most secured computers are those not connected to
the Internet and shielded from any interference”
Chapter - One
Introduction to Information
Assurance and Security
2
Overview of Information
assurance & security
(What is security?)
Security is a continuous process of protecting an object
from attack. That object may be a person, an organization
such as a business, or property such as a computer
system or a file.
Security is the quality or state of being secure—to be
free from danger.
When we consider a computer system, for example, its
security involves the security of all its resources such as
its physical hardware components such as readers,
printers, the CPU, the monitors, and others. In addition to
its physical resources, it also stores non-physical
3
resources such as data and information .
Overview (Cont’d …)
(What is info assurance?
How does it differ from info security?)
6
Overview (Cont’d …)
Security Goals
8
Overview (Cont’d …)
Confidentiality
To prevent unauthorized disclosure of information to
third parties. This includes the disclosure of
information about resources.
Need for keeping information secret arises from use
of computers in sensitive fields such as government
and industry.
Access mechanisms, such as cryptography, support
confidentiality
– Example: encrypting income tax return
9
Overview (Cont’d …)
Integrity
• To prevent unauthorized modification of resources and maintain
the status quo. It includes the integrity of system resources,
information, and personnel. The alteration of resources like
information may be caused by a desire for personal gain or a need
for revenge.
• Often requires preventing unauthorized changes.
• Includes data integrity (content) and origin integrity ( source of
data also called authentication)
• Include prevention mechanisms and detection mechanisms
– Example: Newspaper prints info leaked from White House and
gives wrong source
• Includes both correctness and trustworthiness
10
Overview (Cont’d …)
Availability
• To prevent unauthorized withholding of system
resources from those who need them when they need
them.
• Is an aspect of reliability and system design
• Attempts to block availability, called denial of
service attacks are difficult to detect
– Example: bank with two servers –one is blocked,
the other provides false information
11
Reasons for
Implementing security
(Why do we need security?)
12
Reasons (Cont’d …)
(Why do we need security?)
13
Reasons (Cont’d …)
(What if not secured?)
Damage to any IT-based system or activity can
result in severe disruption of services and losses.
Results of Security Breach:
Destruction of Resources
Corruption of Data and Applications
Denial of Services
Theft of Services
Theft of Resources
14
Reasons (Cont’d …)
(That is why…)
..we need security
– To safeguard the confidentiality, integrity,
authenticity and availability of data transmitted over
insecure networks.
– Internet is not the only insecure network in this world
– Many internal networks in organizations are prone to
insider attacks
– In fact, insider attacks are greater both in terms of
likelihood of happening and damage caused
15
Reasons (Cont’d …)
(security controls)
Security controls
– Authentication (Password--- What we know
Cards---------What we have
Biometrics--- who we are
– Encryption
– Administrative procedures
– Standards
– Physical Security
– Laws
16
Reasons (Cont’d …)
(security policy, service & mechanism )
17
Reasons (Cont’d …)
(security services)
Five Categories of Security Services
A. Authentication (who created or sent the data)
B. Access control (prevent misuse of resources)
C. Confidentiality (privacy)
D. Integrity (has not been altered)
E. Non-repudiation (the order is final)
18
Enterprise Security
19
Enterprise Security(Cont’d..)
Enterprise security encompasses:
Information security: how information
technology supports safe business practices.
Business security: security processes and the
security control framework, in the context of the
business.
Physical security: how facilities and access
control support the logical security model.
Operational risk management: providing a risk-
based approach.
20
Cyber Defense
(what is cyber? What abt Cyberspace?)
21
Cyber Defense
(Cont’d)
PRESENT
Cyber security is a young and immature field
The attackers are more innovative than defenders
Defenders are mired in FUD (fear, uncertainty and
doubt) and fairy tales
FUTURE
Cyber security will become a scientific discipline
It will be application & technology centric
It will never be “solved” but will be “managed”
22
Cyber Defense
(Cont’d)
Defending schemes:
OLD: Defend the entire network to the same degree
NEW: Defend selectively and dynamically
OLD: End user Blame and harass
NEW: The end user is part of the solution
OLD: Defend against yesterday’s attacks
NEW: Be proactive, get ahead of the curve, future-
proof
23
//End of chap-1
THE END OF
CHAP-ONE !!!
Q&A?
24