Professional Documents
Culture Documents
Information Security
Information is an important part of an
organization or a business that requires more
attention to preserve its Integrity, Privacy and
Availability
Information security refers to the protection of
information,
It is the process of securing ,protecting and
safeguarding your information from
unauthorized access, use and modification.
What is Information Security?
Information Security
Information security is the process of protecting
information from unauthorized access, use,
disclosure, destruction, modification, or disruption
The protection of computer systems and information
from harm, theft, and unauthorized use.
Protecting the confidentiality, integrity and
availability of information
Information security is an essential infrastructure
technology to achieve successful information-based
society
Highly information-based company without
information security will lose competitiveness 3
What kind of protection?
Protecting important document /
computer
Protecting communication networks
Protecting Internet
Protection in ubiquitous world
Definitions
Computer Security - generic name for the
collection of tools designed to protect data and
to thwart hackers
security attack
security service
Security Attack
Any action that compromises the security of
information owned by an organization
Information security is about how to prevent
attacks, or failing that, to detect attacks on
information-based systems
often threat & attack used to mean same thing
have a wide range of attacks
can focus of generic types of attacks
passive
active
Security Attack
Passive Attacks
Passive Attack
Passive attacks are in the nature of
eavesdropping on, or monitoring of,
transmissions.
The goal of the opponent is to obtain
information that is being transmitted. Two
types of passive attacks are release of
message contents and traffic analysis.
Passive Attacks
1. Release of message contents
The release of message contents is easily understood . A
telephone conversation, an electronic mail message, and
a transferred file may contain sensitive or confidential
information.
2. Traffic Analysis
The opponent could determine the location and identity of
communicating hosts and could observe the frequency
and length of messages being exchanged. This
information might be useful in guessing the nature of the
communication that was taking place.
Active Attacks
Active Attacks
Active attacks involve some modification
of the data stream or the creation of a
false stream and can be subdivided into
four categories: masquerade, replay,
modification of messages, and denial of
service.
Active Attacks
1. Masquerade
A masquerade takes place when one entity pretends to be a
different entity .
For example, authentication sequences can be captured and
replayed after a valid authentication sequence has taken
place, thus enabling an authorized entity with few privileges
to obtain extra privileges by impersonating an entity that
has those privileges.
2. Replay
involves the passive capture of a data unit and its subsequent
retransmission to produce an unauthorized effect
Active Attacks
3. Modification of messages
It simply means that some portion of a
legitimate message is altered, or that
messages are delayed or reordered, to
produce an unauthorized effect
4. The denial of service
prevents or inhibits the normal use or
management of communications facilities
Security Service
Information state
Security services
Security countermeasures
Information Assurance versus
Information Security
Both involve people, processes, techniques, and
technology Information assurance and information
security are often used interchangeably (incorrectly)
Information Security is focused on the confidentiality,
integrity, and availability of information (electronic and
non-electronic)
IA has broader implications and explicitly includes
reliability, access control, and nonrepudiation as well as
a strong emphasis on strategic risk management
ISO information security management standards (ISMS)
are more closely aligned with IA
Why is Cyber Security
Important?
Governments, military, corporations, financial
institutions, hospitals and other businesses collect,
process and store a great deal of confidential
information on computers and transmit that data
across networks to other computers.
With the growing volume and sophistication of
cyber attacks, ongoing attention is required to
protect sensitive business and personal
information, as well as safeguard national
security.
Cyber Security
Cyber security is the protection of information and
information systems against the potential threats
on the internet
Cyber security means securing the information
related to the use of internet
Security on the internet must involve information
or information system.
Specific measure to maintain cyber security
Viruses and identity threat
Protection of applications and individual privacy
Protection from online Predators and cyberbullies
(cyberharassment)
Security Risk Analysis
Risk: a quantified measure of the likelihood of a threat being
realised.
Risk Analysis involves the identification and assessment of
the levels of risk, calculated from
Values of assets
Business Objectives:
Monetary losses
Loss of personal privacy
Loss of commercial confidentiality
Legal actions
Public embarrassment
Danger to personal safety
Risk Analysis Steps
Decide on scope of analysis
Set the system boundary
probability of attack?