All Chapters (10 Files Merged)
All Chapters (10 Files Merged)
Management – Part 1
Lecture 8
Basic Concepts
What is Risk?
In short Risk is the potential for loss, damage or destruction of
assets or data.
Risk Management (RM)
Risk management in information security refers to the process of
identifying, assessing, and mitigating risks to information assets and
systems. It involves systematically analyzing potential threats,
vulnerabilities, and the impact of potential incidents, and implementing
measures to reduce risks to an acceptable level.
What is RM Purpose?
To identify potential problems before they occur and to
ensure the desired business outcomes are achieved
High The loss of Confidentiality (C), Integrity (I), or Availability (A) could be H
expected to have a severe or catastrophic adverse effect on organizational
operations, organizational assets or individuals.
HR&Admin App H
Network Rack L
Obsolescence Outdated
Technologies
Outdated 3 ± 20%
Technologies
0.1 Low Not expected, but there's a slight possibility it may occur
at some time
0.5 Moderate The event might occur at some time as there is a history
of casual occurrence
X =
2. Network Core Router 0.5 50 25
Equipment
IP Phone 0.1 10 1
1 100
2 100
Overall Risk Rating Calculation
3 25
253 ÷ 700 x 100 = 36.14 %
4 25
5 1
6 1
7 1
Total: 253
Overall Risk Rating - 36.14 %
2. Establish procedures. Make sure that you have clear procedures for responding to different
types of security incidents. This will help ensure that everyone is on the same page when
resolving an incident.
3. Train employees. Train security and other staff to recognize and respond to various incidents.
This will help get the business back up and running with as little downtime as possible.
4. Create a communication plan. Make sure you have a communication plan and incident
response policy in place for sharing information about incidents with employees, customers, and
partners.
5. Test your plan. Testing your plan regularly ensures that it runs smoothly, functions effectively,
and is updated to account for new developments in business operations and cybersecurity.
Roles and Responsibilities of IM Team
1. Identifying incidents The first step in resolving an incident is identifying that it has occurred.
Incident managers must be able to promptly locate any issue that could impact business
operations
2. Resolving incidents. Once an incident has been identified, it is up to the incident manager to
fix it as quickly as possible. This often includes working with other departments to get things back
up and running
3. Reporting incidents Incident managers must provide regular reports on all happenings in their
organization. This helps prevent future incidents and keeps everyone up to date on the latest
information.
4. Training employees One of the critical responsibilities of an incident manager is training staff
on how to respond to different types of incidents. This includes teaching them about the
procedures that have been put in place and helping them understand the impact that an
incident can have on business operations
Benefits of an Incident Management Plan
1. Reduced downtime By quickly identifying and resolving incidents, businesses can minimize
the downtime their employees experience. This is especially important for companies that rely
on technology to do their work.
2. Improved customer service If an incident affects customers, companies must resolve the
issue as soon as possible. Incident management can help businesses do this properly and
efficiently.
3. Prevention of future incidents By identifying the root cause of incidents and fixing them,
companies can prevent the same types of incidents from happening again.
Step 2: Incident Recording and Assignment In this phase, the initial reporting and recording of
the incident take place. This phase handles identifying an incident and defining proper
incident communication plans for the employees and also includes communication methods
that involve informing IT support personnel or submitting an appropriate ticket.
Steps of IH&R Process
Step 3: Incident Triage In this phase, the identified security incidents are analyzed, validated,
categorized, and prioritized. The IH&R team further analyzes the compromised device to find
incident details such as the type of attack, its severity, target, impact, and method of
propagation, and any vulnerabilities it exploited.
Step 4: Notification In the notification phase, the IH&R team informs various stakeholders,
including management, third-party vendors, and clients, about the identified incident.
Step 5: Containment This phase helps to prevent the spread of infection to other
organizational assets, preventing additional damage.
Steps of IH&R Process
Step 6: Evidence Gathering and Forensic Analysis In this phase, the IH&R team accumulates
all possible evidence related to the incident and submits it to the forensic department for
investigation. Forensic analysis of an incident reveals details such as the method of attack,
vulnerabilities exploited, security mechanisms averted, network devices infected, and
applications compromised.
Step 7: Eradication In the eradication phase, the IH&R team removes or eliminates the root
cause of the incident and closes all the attack vectors to prevent similar incidents in the future.
Step 8: Recovery After eliminating the causes for the incidents, the IH&R team restores the
affected systems, services, resources, and data through recovery. It is the responsibility of the
incident response team to ensure that that the incident causes no disruption to the services or
business of the organization.
Steps of IH&R Process
Step 9: Post-Incident Activities Once the process is complete, the security incident requires
additional review and analysis before closing the matter. Conducting a final review is an
important step in the IH&R process that includes:
- Incident documentation
- Incident impact assessment
- Reviewing and revising policies
- Closing the investigation
- Incident disclosure
Questions
Thanks!
Compliance and Intellectual
Property
Lecture 7
Information Security Compliance
Information security compliance refers to the adherence of an organization or individual to a set of rules, regulations,
standards, and best practices designed to protect the confidentiality, integrity, and availability of sensitive information.
Importance of Information Security Compliance
1. Protection of Sensitive Data: Compliance measures help protect sensitive information from unauthorized access,
disclosure, alteration, or destruction.
2. Legal and Regulatory Requirements: Organizations must comply with various laws and regulations to avoid legal
consequences and penalties.
3. Risk Mitigation: Compliance helps identify and address potential security risks, reducing the likelihood of security
breaches and incidents.
4. Trust and Reputation: Demonstrating compliance can build trust with customers, partners, and stakeholders,
enhancing an organization's reputation.
5. Competitive Advantage: Compliance can be a competitive advantage, as customers may prefer doing business with
organizations that prioritize security.
Common Frameworks and Regulations
The concept of information security compliance is prevalent in various industries and often involves complying with
specific laws, regulations, or industry standards that are relevant to the handling of sensitive data. Some of the well-
known regulations and standards include:
1. General Data Protection Regulation (GDPR): A European Union (EU) law that focuses on data protection and privacy
for individuals within the EU. Organizations that handle the personal data of EU citizens need to comply with GDPR
requirements.
2. Health Insurance Portability and Accountability Act (HIPAA): Applicable to healthcare providers in the United
States, HIPAA sets standards for protecting patients' medical records and other personal health information.
3. Payment Card Industry Data Security Standard (PCI DSS): This standard applies to organizations that handle credit
card transactions and aims to protect cardholders' data from unauthorized access.
Common Frameworks and Regulations
4. ISO/IEC 27001: A widely recognized international standard that provides a systematic approach to managing
sensitive company information securely.
5. National Institute of Standards and Technology (NIST) Cybersecurity Framework: A set of guidelines and best
practices developed by NIST to improve the cybersecurity posture of organizations.
PCI DSS v4.0
The standard consists of 12 main requirements, which are grouped into six primary control objectives:
2. Do not use vendor-supplied defaults for system passwords and other security parameters
10. Track and monitor all access to network resources and cardholder data
12. Maintain a policy that addresses information security for all personnel
Intellectual Property - IP
Intellectual property (IP) refers to creations of the mind, such as inventions, literary and artistic works, designs,
symbols, names, and images used in commerce. Intellectual property plays a crucial role in information security, as it
helps protect valuable assets and sensitive information from unauthorized use, copying, or distribution. The four
primary elements of intellectual property are as follows:
Elements of Intellectual Property
The four primary elements of intellectual property are as follows:
1. Copyright: Copyright protects original works of authorship fixed in a tangible medium of expression. The works
eligible for copyright protection include literary works (e.g., books, articles), artistic works (e.g., paintings,
photographs), music, films, software code, and other creative expressions. Copyright grants the creator exclusive
rights to reproduce, distribute, perform, display, and create derivative works based on their original work.
2. Patents: Patents provide inventors with exclusive rights to their inventions, typically for a limited period. To be
eligible for a patent, an invention must be novel, non-obvious, and useful. Patents cover new and useful processes,
machines, compositions of matter, or improvements to existing inventions. By obtaining a patent, inventors can
prevent others from making, using, selling, or importing their patented invention without permission.
Elements of Intellectual Property (Cont.)
3. Trademarks: Trademarks are symbols, names, phrases, logos, or other distinctive signs used to identify and
distinguish goods or services in the marketplace. They are essential for brand recognition and consumer trust.
Trademark protection grants the owner exclusive rights to use the mark in connection with specific goods or services
and to prevent others from using confusingly similar marks in the same or related business sectors.
4. Trade Secrets: Trade secrets are confidential business information that provides a competitive advantage. Unlike
other forms of intellectual property, trade secrets are not registered or publicly disclosed. Instead, their protection
relies on maintaining secrecy. Examples of trade secrets include manufacturing processes, customer lists, marketing
strategies, and proprietary formulas.
Questions
Thanks!
AI ML in Information
Security
Lecture 8
About AI and ML
AI (Artificial Intelligence) is the broader field of computer science focused on creating intelligent
machines that can perform tasks requiring human-like intelligence.
2. Behavioral Analysis: Machine learning models can be trained to understand typical user
behavior within an organization. Deviations from normal patterns can signal unauthorized
access or insider threats. Behavioral analysis helps identify abnormal behavior and potential
security risks.
3. Malware Detection: AI-powered antivirus and anti-malware solutions can identify and block
new and previously unknown malware strains based on their behavior, code analysis, and other
characteristics. ML allows these solutions to evolve and adapt to new threats without requiring
constant manual updates.
AI and ML in Information Security (Cont.)
4. Phishing and Fraud Detection: AI can be used to analyze email content, URLs, and user
behavior to detect phishing attempts and fraudulent activities. Machine learning models can
recognize phishing patterns and reduce the likelihood of successful phishing attacks.
5. Network Security: AI can be used to monitor and analyze network traffic, identifying patterns
that indicate potential intrusions or suspicious activities. ML-based Intrusion Detection Systems
(IDS) and Intrusion Prevention Systems (IPS) can respond to threats in real-time.
9. Security Analytics and Reporting: AI can assist in generating security reports, identifying
trends, and providing insights into the overall security posture of an organization.
Example: Google Utilize AI And ML To
Secure User Data
1. Anomaly Detection: Google uses ML algorithms to analyze user behavior and account activity,
identifying patterns and detecting anomalies that may indicate suspicious or unauthorized access.
2. Account Protection: If a login attempt is deemed risky, additional security measures such as two-
factor authentication may be triggered to ensure the account's safety.
3. Password Security: Google's Password Manager uses AI to help users create strong and unique
passwords, as well as to detect and warn users about compromised or weak passwords.
4. Phishing and Malware Detection: AI is employed to analyze email content, URLs, and attachments
to detect and prevent phishing attempts and malware-laden messages in Gmail
5. Account Recovery and Identification: AI is used to analyze various data points during the account
recovery process to verify the account owner's identity and prevent unauthorized access.
Example: Google Utilize AI And ML To
Secure User Data
6. Suspicious Activity Alerts: If suspicious activity is detected, such as multiple login attempts from
different locations, Google can alert the user through email or notifications.
7. Spam and Fraud Detection: ML algorithms help detect and filter spam messages, fraudulent
activities, and potential scams across various Google services, ensuring a safer user experience.
9. CAPTCHA and bot protection: AI assists in developing and improving CAPTCHA mechanisms that
can differentiate between human users and automated bots, ensuring that bots cannot easily
bypass security measures.
Thanks!
Daffodil International University
Dept. of CSE
Information Security
Lecture 15
Personal Device Security (Antivirus and Firewall)
Personal Device Security
❏ When you install any antivirus software, it usually comes with preloaded information of the existing and
popular viruses in the world.
❏ When you run antivirus software, it matches your computer’s information and the preloaded information.
When there is a match, you will be notified of the same. You can delete the affected files manually by
choosing the clean, clear, or delete option in the antivirus software.
❏ In addition, you can change the settings to automatically delete such malware or viruses in the future as
well.
Features of Antivirus Software:
❏ Signature-based detection -
❏ This is most basic in any traditional antivirus programming
❏ This is a very effective approach as it prevents from all existing viruses but as
it works only on the stored definitions of viruses, it is not effective for new virus
(or that are not stored in the library) so a regular updation is required for such
antiviruses.
How traditional antivirus works?
❏ For example a program 10235 is considered as virus and stored in the library of
antivirus as a virus signature then if the computer finds a program 10235 in the
computer while scanning then it considers it as a virus and alerts the user to
choose the required action on the virus (like remove, repair or no action).
How traditional antivirus works?
❏ Heuristic-based detection –
❏ The heuristic-based detection generally works better in combination with
signature-based detection.
❏ Both Hueristic and signature-based detection, when combined, make the
antivirus more effective.
❏ The Heuristic-based detection has been most used in all the antivirus
software.
How traditional antivirus works?
Behavioral-based recognition
❏ Behavioral-based recognition -
❏ This is also one of the main detection technique to search the virus
❏ Which is also called as intrusion detection mechanism.
❏ This detects the behavior of malware
❏ This will only detect the malware when malware tries to corrupt other
files of your computer
❏ For example, code that attempts to perform unauthorized or abnormal
actions would indicate the object is malicious, or at least suspicious.
Some examples of behaviors that potentially signal danger include
modifying or deleting large numbers of files, monitoring keystrokes,
changing settings of other programs and remotely connecting to
computers.
Data mining techniques
❏ Data mining strategies - This is one of the most recent patterns in recognizing
a malware. With an arrangement of the traits of a program, Data mining finds
if the file or an application is a malware.
How to Infect Systems Using a Fake Antivirus
Firewall
In computing, a Firewall is a network security system that monitors and controls
incoming and outgoing network traffic based on predetermined security rules.
A firewall typically establishes a barrier between a trusted network and an
untrusted network, such as the Internet.
● Proxy firewall (Application layer) operates at the application layer (application layer protocols
HTTP, SMTP, DHCP, FTP, etc…) to filter incoming traffic between your network and outside
network.
● A proxy firewall is configured to allow only certain types of traffic to pass (for example, HTTP
files, or web pages).
● It is also called web application firewall.
● Like a security guard, it monitors incoming data. If no problem is detected, the data is allowed to
enter.
Stateful inspection firewall
Next generation Firewall
● Next generation Firewall are evolved to block modern threats such as advanced malware
and application-layer attacks.
● They have the capabilities of traditional firewalls but also have some additional features.
● Deep packet inspection allows firewall to inspects packet payloads and application
accessed by the packets
● Application awareness: Enables firewall to check which applications are running and
which ports are open.
● Encrypted traffic inspection.
● Intrusion prevention systems to automatically stop attacks against your network.
Differences between Anti-virus and Firewall
Thank You
Daffodil International University
Dept. of CSE
Information Security
Lecture
Personal Device Security(Contd.)
Personal Device Security-Intrusion Detection System (IDS)
An Intrusion Detection System (IDS) is a monitoring system that detects suspicious
activities and generates alerts when they are detected.
How an IDS detects an intrusion?
Personal Device Security-Intrusion Prevention System (IPS)
An intrusion prevention system (IPS) is a network security technology that
continuously monitors network traffic for suspicious activity and takes steps to
prevent it.
Personal Device Security- Honeypot
A honeypot in cyber security is a trap set to lure or trap hackers. This can be
done by using a decoy or false data, a fake server, or a false user. A honeypot can
help an administrator learn more about their hacker and attack patterns.
Lecture 17
Introduction to Cryptography
Cryptography
Cryptography is the practice of concealing information by converting
plaintext (readable format) into ciphertext (unreadable format) using a key
or encryption scheme.
Cryptography is categorized into two types according to the number of keys employed for
encryption and decryption.
2
Features of Blockchain
Transparency Integrity
. 01 04
Immutability Decentralization
03 06
3
Features of Blockchain
1.Transparency is a key feature of blockchain technology, contributing to its trustworthiness
and widespread appeal across various sectors. It refers to the ability of all participants in a
blockchain network to view transactions and data stored on the distributed ledger. This
openness ensures that users can verify and audit transactions independently, promoting
accountability and trust without the need for intermediaries.
2. Security - Cryptographic hashing algorithm is used for hashing. Further fixed-length has
output value is generated irrespective of the input data length. This makes it difficult to hack.
Also, the components that go into block generation increases the difficulty level for hacking.
Immutability is another factor adding to securing information. Thus the systemic aspect of
BCT inherently provides security.
3. Immutability means something that can’t be changed or altered. This is one of the top
blockchain features that help to ensure that the technology will remain as it is – a permanent,
unalterable network.
4
Features of Blockchain
4. Integrity : By design, blockchains are inherently resistant to the modification of data. Blockchain
ledgers are immutable, meaning that if data additions or transactions have been made, it cannot be
edited or deleted. Moreover, blockchains are not only a data structure, but also a timekeeping
mechanism for the data structure. Therefore, proof of the history of data is easily reportable and
updated to the second.
One aspect of blockchain technology that is particularly important for improved data integrity is the
Merkle Tree. This ensures the integrity of the data in the blockchain. A Merkle Tree is a fundamental
component of blockchains which uses cryptographic hash functions.
5. Anonymity : Blockchain offers the feature of anonymity as well. The identity of all the
participating entities is kept anonymous or pseudo anonymous
○ Hash
Hash : 7B2Z Hash : 3DF5
Previous Hash : 000
Previous Hash : 2ZB1 Previous Hash : 7B2Z
6
Hashing and public key cryptography in Blockchain
Malicious user
: 7B2Z
7
Bitcoin
● Is an application of blockchain technology
Idea was published under Start of the Bitcoin Fist cryptocurrency stock
the pseudonym Satoshi Network
Nakamoto exchange is launched
8
Bitcoin
9
Ethereum
2013 2014
10
Smart Contract
value.
Example :
11
Smart Contract
12
Ethereum Vs Bitcoin
13
Thank You
Lecture 19
Cyber Law
Cyber Law
Cyber law, also known as Internet Law. It is any law that applies to the internet and internet-related technologies.
Cyber law is one of the newest areas of the legal system. This is because internet technology develops at such a rapid
pace. Cyber law provides legal protections to people using the internet.
■ Freedom of expression
■Access to and usage of the Internet
■ Online privacy
Cyber Law in Bangladesh
Cyber Law in Bangladesh- Digital Security Act-2023
The Digital Security Act 2023 in Bangladesh is the latest amendment or continuation of the previous Digital
Security Act 2018, designed to regulate and address issues related to cybersecurity, online safety, and digital
crimes.
Section 18:
Unauthorized Access and Assistance in Unauthorized Access