Chapter One
Chapter One
Introduction
“The quality or state of being secure to be free from danger”
To be protected from adversaries from those who would do harm, intentionally or
otherwise
Freedom from risk or danger; safety.
Freedom from doubt, anxiety, or fear; confidence
A successful organization should have multiple layers of security in place:
o Physical security
o Personal security
o Operations security
o Communications security
o Network security
o Information security
“The term computer system security means the collective processes and mechanisms by
which sensitive and valuable information and services are protected from publication,
tamper [ alter] or collapse by unauthorized activities or untrustworthy individuals and
unplanned events respectively.
o
No Tension??
No Computer
No Network
No Internet
• The most secured manner→ Either no computers or are those not connected to any
Network or Internet and protected from any intrusion
What Is Information Security?
Deals with several different "trust" aspects of information and its protection.
“Protection of information systems against unauthorized access to or modification of
information, whether in storage, processing or transit, and against the denial of service to
authorized users or the provision of service to unauthorized users, including those
measures necessary to detect, document, and counter such threats.”
Information security is defined as “protecting information and information systems from
unauthorized access, use, disclosure, disruption, modification, or destruction, "according
to U.S. law.
In essence, it means we want to protect our data and our systems from those who would
seek to misuse it.
What is Information Security
The protection of information and its critical elements, including systems that uses,
stores, and transmits information
Necessary tools: policy, awareness, training, education, technology
IS security being the collection of activities that protect the information system and the
data stored in it.
The protection of information and its critical elements, including systems and hardware
that use, store, and transmit that information.
Information security: a “well-informed sense of assurance that the information risks and
controls are in balance.”
IS security being a classic battle of “good vs. evil.”
Computer security: The protection afforded to an automated information system in
order to attain the applicable objectives of preserving the integrity, availability and
confidentiality of information system resources (includes hardware, software, firmware,
information/data, and telecommunications).
IT Security Management: a process used to achieve and maintain appropriate levels of
confidentiality, integrity, availability, accountability, authenticity and reliability.
IT Security Management functions include:
o Organizational IT security objectives, strategies and policies
o Determining organizational IT security requirement
o Identifying and analyzing security threats to IT assets
o Identifying and analyzing risks
o Specifying appropriate safeguards
o Monitoring the implementation and operation of safeguards
o Developing and implement a security awareness program
o Detecting and reacting to incidents
o In a general sense, security means protecting our assets.
o This may mean protecting them from attackers invading our networks, natural
disasters, adverse environmental conditions, power failures, theft or vandalism, or
other undesirable states.
o Ultimately, we will attempt to secure ourselves against the most likely forms of
attack, to the best extent we reasonably can, given our environment.
Securing Components in IS
Computer (software and hardware) is the key component in an information system
Computer can be subject of an attack and/or the object of an attack
o When the subject of an attack, computer is used as an active tool to conduct attack
o When the object of an attack, computer is the entity being attacked
o The attacks can also be two types
• Direct (the attack is directed to the computer itself)
• Indirect (the computer is attacked to cause problem to other system e.g. DOS)
Physical security – To protect the physical items, objects, or areas of an organization
from unauthorized access and misuse.
Personal security – To protect the individual or group of individuals who are authorized
to access the organization and its operations.
Operations security – To protect the details of a particular operation or series of activities.
Communications security – To protect an organization’s communications media,
technology, and content.
Network security – To protect networking components, connections, and contents.
Common Computer Security Measures
Most computer security measures involve data encryption and passwords.
Data encryption is the translation of data into a form that cannot be read without a
deciphering mechanism.
A password is a secret word or phrase that gives a user access to a particular program or
system.
Goals of Computer Security / Information Security
To maintain information Confidentiality
To ensure the Integrity and Reliability of data resources
To ensure the Uninterrupted Availability of data resources and online operations
To prevent Non-repudiation of information sent in reference to security and privacy
laws and guidelines
•
Information Security: Basic Requirements also known as the security triads:(CIA)
o Confidentiality
o Integrity
o Availability (Recoverability)
Includes Physical Security as well as Electronic
Although the use of the CIA triad to define security objectives is well established, some
in the security field feel that additional concepts are needed to present a complete picture.
Two of the most commonly mentioned are:
o Authenticity: The property of being genuine and being able to be verified and
trusted; confidence in the validity of a transmission, a message, or message
originator.
o Accountability: The security goal that generates the requirement for actions of an
entity to be traced uniquely to that entity.
Critical Characteristics of Information
The C.I.A. triangle has expanded into a list of critical characteristics of information ✓
The value of information comes from the characteristics it possesses:
o Accuracy – Free from mistake or error and having the value that the end user
expects. If information contains a value different from the user’s expectations due
to the intentional or unintentional modification of its content, it is no longer
accurate.
o Authenticity –The quality or state of being genuine or original, rather than a
reproduction or fabrication. Information is authentic when it is the information
that was originally created, placed, stored, or transferred.
o Utility – The quality or state of having value for some purpose or end.
Information has value when it serves a particular purpose. This means that if
information is available, but not in a format meaningful to the end user, it is not
useful.
o Possession – The quality or state of having ownership or control of some object or
item. Information is said to be in possession if one obtains it, independent of
format or other characteristic. While a breach of confidentiality always results in a
breach of possession, a breach of possession does not always result in a breach of
confidentiality.
Why Is Computer Network and Information Security Important?
To protect company assets
To gain a competitive advantage
To comply with regulatory requirements and fiduciary responsibilities ✓ To keep your
job.
The growing fear of cyber terrorism
Attacks to the infrastructure would affect a large portion of the Internet and create a large
amount of service disruption
Challenges in Computer Network and Information security
The requirements seem to be straightforward; indeed, most of the major requirements for
security services can be given self-explanatory, one-word labels: confidentiality,
authentication, nonrepudiation, or integrity. But the mechanisms used to meet those
requirements can be quite complex, and understanding them may involve rather subtle
reasoning.
In developing a particular security mechanism or algorithm, one must always consider
potential attacks on those security features. In many cases, successful attacks are
designed by looking at the problem in a completely different way, therefore exploiting an
unexpected weakness in the mechanism.
The procedures used to provide particular security services are often counter intuitive.
Typically, a security mechanism is complex, and it is not obvious from the statement of a
particular requirement that such elaborate measures are needed.
Security mechanisms, it is necessary to decide where to use them. This is true both in
terms of physical placement and in a logical sense.
Security mechanisms typically involve more than a particular algorithm or protocol. They
also require that participants be in possession of some secret information (e.g., an
encryption key), which raises questions about the creation, distribution, and protection of
that secret information.
It is a battle of wits between a perpetrator who tries to find holes and the designer or
administrator who tries to close them. The great advantage that the attacker has is that he
or she need only find a single weakness, while the designer must find and eliminate all
weaknesses to achieve perfect security.
There is a natural tendency on the part of users and system managers to perceive little
benefit from security investment until a security failure occurs.
Security requires regular, even constant, monitoring, and this is difficult in today’s short-
term, overloaded environment.
Security is still too often an afterthought to be incorporated into a system after the design
is complete rather than being an integral part of the design process.
Many users and even security administrators view strong security as an impediment to
efficient and user-friendly operation of an information system or use of information. The
difficulties just enumerated will be encountered in numerous ways as we examine the
various security threats and mechanisms.
Internet infrastructures are vulnerable.
Solutions usually require a larger scale of modification
Security and performance tradeoff
Security is only as strong as the weakest link
Attacks can be easily launched and difficult to be traced
What are the basic security measures?
External security: is about protection of computer systems from environmental damages
such as floods and heat, physical security such as locking rooms and computers and
electrical protection such as power surge and electromagnetic interfaces.
Operational security: is about deciding who has access to what, limiting access time and
location
Surveillance: proper placement of a security cameras and can deter theft and vandalism
Passwords/authentication: the most common form of security. There are some simple
rules for password security systems like:
o Change your password often
o Pick a good, strong and random password
o Don’t share password or write down them
o Don’t select/use names and familiar objects as password
o Authentication: the process of reliably verifying the identity of
someone/something by means of a secret (password), an object (smart card),
physical characteristics (finger print) and trust.
Auditing: used to detect wrong doing
Access rights: determines the security by means of who and how. Who do you give
access right to? (No One, Group of Users, entire set of Users). How a user/group of users
does have access? (Read, write, delete, print, copy, execute).
Viruses/worms and antivirus tools
Firewalls
Encryption and Decryption Techniques
Digital Signature
Security Policy
Categories of attacks
Interruption: An attack on availability
Interception: An attack on confidentiality
Modification: An attack on integrity
Fabrication: An attack on authenticity
Categories of Attacks/Threats
Classification of Vulnerabilities