Unit I Notes
Unit I Notes
Syllabus: Unit I
Introduction- Introduction to Information Systems, Types of Information Systems, Development of
Information Systems, Introduction to Information Security, Need for Information Security, Threats
to Information Systems, Information Assurance, Cyber Security, and Security Risk Analysis.
Cyber-Security:
Cyber-security is the practice of protecting systems, networks, and programs
from digital attacks. These cyber-attacks are usually aimed at accessing,
changing, or destroying sensitive information; extorting money from users; or
interrupting normal business processes.
Implementing effective cyber-security measures is particularly challenging
today because there are more devices than people, and attackers are becoming
more innovative.
What is cyber-security all about?
People
Users must understand and comply with basic data security principles like
choosing strong passwords, being wary of attachments in email, and backing up
data. Learn more about basic cyber-security principles.
Processes
Organizations must have a framework for how they deal with both attempted
and successful cyber attacks. One well-respected framework can guide you. It
explains how you can identify attacks, protect systems, detect and respond to
threats, and recover from successful attacks. Watch a video explanation of
the NIST cyber-security framework.
Technology
Everyone also benefits from the work of cyber-threat researchers, like the team
of 250 threat researchers at Talos, who investigate new and emerging threats
and cyber attack strategies. They reveal new vulnerabilities, educate the public
on the importance of cyber-security, and strengthen open source tools. Their
work makes the Internet safer for everyone.
Information assurance:
Information assurance is the practice of protecting against and managing
risk related to the use, storage and transmission of data and information systems.
Information assurance processes typically ensure the following functions
for data and associated information systems:
Availability ensures information is ready for use by those that are allowed to
access it and at a required level of performance.
Authentication ensures that users are who they say they are using methods
such as individual user names, passwords, biometrics, digital
certificates and security tokens.
Information Assurance (IA) model is an extension of the original 1991 McCumber INFOSEC
Model expanding coverage, responsibilities and accountability of security professionals
and also establishes an additional view of the states of information. IA is defined by the
National Security Telecommunications and Information Systems Security Committee
(NSTISSC) as: “Information operations (IO) that protect and defend information and
ii. Security Services: This dimension forms the very basis or the fundamental
pillar of the IA security model as it defines five security services; availability,
integrity, confidentiality, authentication and non-repudiation. Of these five, the
first three were also a part of the INFOSEC model. IA model introduced
authentication as a means of verifying an individual’s authorizations to receive
specific categories of information. Non-repudiation provided the sender of data
with proof of delivery and identity.
iii. Security Countermeasures: This dimension safeguards systems from
immediate vulnerability by accounting for technology, operations and people.
People require awareness, literacy, training and education in sound security
practices in order for systems to be secured and updated with the ever evolving
technology.
iv. Time: Time is a confounding change agent which can be viewed in different
Types of Information
Based on Anthony's classification of Management, information used in business
for decision-making is generally categorized into three types −
• Strategic Information − Strategic information is concerned with long
term policy decisions that defines the objectives of a business and checks
how well these objectives are met. For example, acquiring a new plant, a
new product, diversification of business etc, comes under strategic
information.
• Tactical Information − Tactical information is concerned with the
information needed for exercising control over business resources, like
budgeting, quality control, service level, inventory level, productivity
level etc.
• Operational Information − Operational information is concerned with
plant/business level information and is used to ensure proper conduction
of specific operational tasks as planned/intended. Various operator
specific, machine specific and shift specific jobs for quality control checks
comes under this category.
Classification by Application
In terms of applications, information can be categorized as −
• Planning Information − These are the information needed for
establishing standard norms and specifications in an organization. This
information is used in strategic, tactical, and operation planning of any
activity. Examples of such information are time standards, design
standards.
• Control Information − This information is needed for establishing
control over all business activities through feedback mechanism. This
information is used for controlling attainment, nature and utilization of
important processes in a system. When such information reflects a
Threats:
In computer security, a threat is a possible danger that might exploit
a vulnerability to breach security and therefore cause possible harm.
A threat, in the context of computer security, refers to anything that has the potential
to cause serious harm to a computer system. A threat is something that may or may
not happen, but has the potential to cause serious damage. Threats can lead to
attacks on computer systems, networks and more.
1. Computer virus
We’ve all heard about them, and we all have our fears. For everyday Internet
users, computer viruses are one of the most common threats to cybersecurity.
Statistics show that approximately 33% of household computers are affected
with some type of malware, more than half of which are viruses.
Computer viruses are pieces of software that are designed to be spread from
one computer to another. They’re often sent as email attachments or
downloaded from specific websites with the intent to infect your computer —
and other computers on your contact list — by using systems on your network.
Viruses are known to send spam, disable your security settings, corrupt and
steal data from your computer including personal information such as
passwords, even going as far as to delete everything on your hard drive.
Leveraging the fear of computer viruses, scammers have a found a new way to
commit Internet fraud.
3. Trojan horse
They spread often by email; it may appear as an email from someone you
know, and when you click on the email and its included attachment, you’ve
immediately downloaded malware to your computer. Trojans also spread when
you click on a false advertisement.
Once inside your computer, a Trojan horse can record your passwords by
logging keystrokes, hijacking your webcam, and stealing any sensitive data you
may have on your computer.
5. Computer worm
Computer worms are pieces of malware programs that replicate quickly and
spread from one computer to another. A worm spreads from an infected
computer by sending itself to all of the computer’s contacts, then immediately
to the contacts of the other computers.
Interestingly, they are not always designed to cause harm; there are worms
that are made just to spread. Transmission of worms is also often done by
exploiting software vulnerabilities.
Have you ever found yourself waiting impatiently for the online release of a
product, one that you’re eagerly waiting to purchase? You keep refreshing the
page, waiting for that moment when the product will go live. Then, as you press
F5 for the last time, the page shows an error: “Service Unavailable.” The server
must be overloaded!
There are indeed cases like these where a website’s server gets overloaded with
traffic and simply crashes, sometimes when a news story breaks. But more
commonly, this is what happens to a website during a DoS attack, or denial-of-
service, a malicious traffic overload that occurs when attackers overflood a
website with traffic. When a website has too much traffic, it’s unable to serve its
content to visitors.
Since it’s likely that not all of those machines belong to the attacker, they are
compromised and added to the attacker’s network by malware. These
computers can be distributed around the entire globe, and that network of
compromised computers is called botnet.
7. Phishing
The attacks often come in the form of instant messages or phishing emails
designed to appear legitimate. The recipient of the email is then tricked into
opening a malicious link, which leads to the installation of malware on the
recipient’s computer. It can also obtain personal information by sending an
email that appears to be sent from a bank, asking to verify your identity by
giving away your private information.
8. Rootkit
We know today that many servers storing data for websites use SQL. As
technology has progressed, network security threats have advanced, leading us
to the threat of SQL injection attacks.
• DNS spoofing
• HTTPS spoofing
• IP spoofing
• ARP spoofing
• SSL hijacking
• Wi-Fi hacking
Spoofing:
Spoofing is a malicious practice employed by cyber scammers and hackers to
deceive systems, individuals, and organizations into perceiving something to be
what it is not. Communication is initiated by the spoofer to the victim or system
from an unknown source but disguised to present itself as an authentic and safe
sender. If you have ever received an email from a seemingly familiar source
asking you to update your profile details because some funny system upgrade
was necessary, then you have experienced spoofing.
Types of Spoofing: