0% found this document useful (0 votes)
47 views47 pages

PoIS 7E PPT - Module 01a

Module 1 introduces the fundamentals of information security, covering its definition, historical evolution, and key concepts such as the C.I.A. triad of confidentiality, integrity, and availability. It emphasizes the importance of protecting organizational information and outlines the roles of security professionals. The module also discusses various approaches to implementing information security, highlighting the balance between security and accessibility.

Uploaded by

theodoralex49
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views47 pages

PoIS 7E PPT - Module 01a

Module 1 introduces the fundamentals of information security, covering its definition, historical evolution, and key concepts such as the C.I.A. triad of confidentiality, integrity, and availability. It emphasizes the importance of protecting organizational information and outlines the roles of security professionals. The module also discusses various approaches to implementing information security, highlighting the balance between security and accessibility.

Uploaded by

theodoralex49
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 47

Module 1

Introduction to Information
Security

Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 1
Icebreaker: Interview Simulation

1. The class will be broken up into pairs of students.


2. Each pair of students will interview each other to discover interesting or
unusual facts.
3. Then each pair will introduce each other to the class.
4. Think about connecting a story from your personal experience to topics that
are relevant to this course.

Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 2
Module Objectives

By the end of this module, you should be able to:


1.1 Define information security
1.2 Discuss the history of computer security and explain how it evolved into
information security
1.3 Define key terms and critical concepts of information security
1.4 Describe the information security roles of professionals within an
organization

Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 3
Introduction

• Every organization, whether public or private and regardless of size, has


information it wants to protect.
• Organizations have a responsibility to all their stakeholders to protect that
information.
• Unfortunately, there aren’t enough security professionals to go around.
• If you’re not part of the solution, you’re part of the problem.

Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 4
The History of Information Security

• Computer security began immediately after the first mainframes were


developed.
− Groups developing code-breaking computations during World War II created
the first modern computers.
− Multiple levels of security were implemented to protect these devices.
• During these early years, information security was a straightforward process
composed predominantly of physical security and simple document
classification schemes.
• The primary threats to security were physical theft of equipment, espionage
against products of the systems, and sabotage.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 5
The Enigma

Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 6
The 1960s

• During the Cold War, many more mainframe computers were brought online to
accomplish more complex and sophisticated tasks.
• The Advanced Research Projects Agency (ARPA) began to examine the
feasibility of a redundant networked communication system.
• Larry Roberts led the development of the ARPANET, which evolved into what
we now know as the Internet.

Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 10
Development of the ARPANET

Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 11
The 1970s and ’80s (1 of 2)

• ARPANET grew in popularity, increasing the potential for misuse.


• Fundamental problems with ARPANET security were identified.
− Individual remote sites did not have sufficient controls and safeguards to
protect data from unauthorized remote users.
− Other problems included:
▪ Vulnerability of password structure and formats
▪ Lack of safety procedures for dial-up connections
▪ Nonexistent user identification and authorizations

Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 12
The 1970s and ’80s (2 of 2)

• Information security began with RAND Report R-609—the paper that started the
study of computer security and identified the role of management and policy
issues in it.
• The scope of computer security grew from physical security to include:
− Securing the data
− Limiting random and unauthorized access to data
− Involving personnel from multiple levels of the organization in information
security

Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 13
Computer Network Vulnerabilities

Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 14
MULTICS
• Early research on computer security research centered on a system called
Multiplexed Information and Computing Service (MULTICS).
• The first operating system was created with security integrated into core
functions.
• Mainframe, time-sharing OS was developed in the mid-1960s by General
Electric (GE), Bell Labs, and Massachusetts Institute of Technology (MIT).
• Several MULTICS key players created UNIX.
− The primary purpose of UNIX was text processing.
• Late 1970s: The microprocessor expanded computing capabilities and security
threats.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 15
The 1990s

• Networks of computers became more common, as did the need to connect them
to each other.
• The Internet became the first global network of networks.
• Initially, network connections were based on de facto standards.
• In early Internet deployments, security was treated as a low priority.
• In the late 1990s and into the 2000s, many large corporations began publicly
integrating security into their organizations.
Information security began to emerge as an independent discipline.

Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 16
2000 to Present

• The Internet brings millions of unsecured computer networks and billions of


computer systems into continuous communication with each other.
• The ability to secure a computer’s data was influenced by the security of every
computer to which it is connected.
• The growing threat of cyberattacks has increased the awareness of need for
improved security.
• The threat environment has grown from the semiprofessional hacker defacing
Web sites for amusement to professional cybercriminals maximizing revenue
from theft and extortion, as well as government-sponsored cyberwarfare groups
striking military, government, and commercial targets.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 17
Brainstorming session

• What is Security?

Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 18
What Is Security?
• “A state of being secure and free from danger or harm; the actions taken to
make someone or something secure.”
• “The protection of information and its critical elements, including systems and
hardware that use, store, and transmit that information” (CNSS).
• InfoSec Includes information security management, data security, and network
security.
• C.I.A. triad of confidentiality, integrity, and availability:
− Is a standard based on confidentiality, integrity, and availability, now viewed
as inadequate.
− Expanded model consists of a list of critical characteristics of information
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 19
Knowledge Check Activity 1

What is security?

a. Freedom from fear


b. Protection from loss
c. Keeping secrets
d. Being secure and free from danger

Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 20
Knowledge Check Activity 1: Answer

What is security?

Answer: D. Being secure and free from danger


Only this answer is complete. Fear has little to do with security; many are fearful
even when secure. Security does not mean losses cannot occur, just that they are
planned for and survivable. Confidentiality (secrets) is just one of the three key
aspects of security.

Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 21
Components of Information Security

Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 22
The C.I.A. Triad

Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 23
Key Information Security Concepts

• Access • Protection profile or security posture


• Asset • Risk
• Attack • Subjects and objects
• Control, safeguard, or • Threat
countermeasure • Threat agent
• Exploit • Threat event
• Exposure • Threat source
• Loss • Vulnerability

Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 24
Key Concepts in Information Security

Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 25
Critical Characteristics of Information

• The value of information comes from the characteristics it possesses:


− Confidentiality
− Integrity
− Availability
− Accuracy
− Authenticity
− Utility
− Possession

Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 26
CNSS Security Model

Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 27
Components of an Information System

• An information system (IS) is the entire set of hardware, software data, people,
procedures, and networks that enable a business to use information.
• All of them work together to support personal and professional operations.
• Each one has its own strengths and weaknesses, as well as its own
characteristics and uses.
• Each one has its own security requirements.

Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 28
Components of an Information System
• An information system (IS) is
Software entire set of people, procedures,
and technology that enable
Networks Hardware
business to use information.
– Software
Information
System
– Hardware
– Data
– People
Procedures Data

– Procedures
People
– Networks

Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be 29
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 29
Balancing Information Security and Access

• It is impossible to obtain perfect


information security—it is a process,
not a goal.
• Security should be considered a
balance between protection and
availability.
• To achieve balance, the level of
security must allow reasonable
access, yet protect against threats.

Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 30
Approaches to Information Security
Implementation: Bottom-Up Approach
• Grassroots effort: systems administrators work to improve security of their
systems.
• Key advantage: technical expertise of individual administrators
• Seldom works, as it lacks a number of critical features:
− Participant support
− Organizational staying power

Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 31
Approaches to Information Security
Implementation: Top-Down Approach
• Initiated by upper management
− Issue policy, procedures, and processes
− Dictate goals and expected outcomes of project
− Determine accountability for each required action
• The most successful type of top-down approach also involves a formal
development strategy referred to as a systems development life cycle.

Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 32
Approaches to Information Security
Implementation

Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 33
Security Professionals and the Organization

• A wide range of professionals are required to support a diverse information


security program.
• Senior management support is the key component.
• Additional administrative support and technical expertise are required to
implement details of an IS program.

Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 34
Senior Management

• Senior technology officer


Chief information • Primarily responsible for advising the senior
officer (CIO) executives on strategic planning that affects the
management of information in the organization

Chief information • Has primary responsibility for assessment,


management, and implementation of InfoSec in
security officer the organization
(CISO) • Usually reports directly to the CIO

Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 35
Knowledge Check Activity 2

What title is given to the person with primary responsibility for assessment,
management, and implementation of InfoSec in the organization?

a. CIO
b. CISO
c. CEO
d. CFO

Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 36
Knowledge Check Activity 2: Answer

What title is given to the person with primary responsibility for assessment,
management, and implementation of InfoSec in the organization?

Answer: B. CISO, or chief information security officer


The CISO usually reports to the CIO. While in some organizations, the CISO
could report to the CFO, that is not common.

Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 37
The CISO’s Place and Roles

Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 38
Information Security Project Team

• A small functional team of people who are experienced in one or multiple facets
of required technical and nontechnical areas:
− Champion
− Team leader
− Security policy developers
− Risk assessment specialists
− Security professionals
− Systems administrators
− End users
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 39
Data Responsibilities

• Data owners/ Data Controller: senior management responsible for the security
and use of a particular set of information
• Data custodian/ Data Processor: responsible for information and systems that
process, transmit, and store it
• Data trustees/ Data Protection Officer (DPO): appointed by data owners to
oversee the management of a particular set of information and to coordinate
with data custodians for its storage, protection, and use
• Data Users/ Subject: have access to information and thus an information
security role

Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 40
Knowledge Check Activity 3

Which group in the organization is appointed by data owners to oversee the


management of a particular set of information and to coordinate with data
custodians for its storage, protection, and use?

a. Data owners
b. Data custodian
c. Data trustee
d. Data user

Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 41
Knowledge Check Activity 3: Answer

Which group in the organization is appointed by data owners to oversee the


management of a particular set of information and to coordinate with data
custodians for its storage, protection, and use?

Answer: C. Data trustee


Only this selection is correct since data owners would not appoint themselves,
data custodians are responsible for the infrastructure that supports information
processing in general, and data users do not have the responsibilities listed.

Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 42
Communities of Interest

• Group of individuals united by similar interests/values within an organization


− Information security management and professionals
− Information technology management and professionals
− Organizational management and professionals

Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 43
Information Security: Is It an Art or a
Science?
• Implementation of information security is often described as a combination of art
and science.
• “Security artisan” idea: based on the way individuals perceive system
technologists and their abilities
• Security as art: no hard and fast rules nor many universally accepted complete
solutions; no manual for implementing security through entire system
• Security as science: technology is developed by scientists and engineers;
specific conditions cause virtually all actions in computer systems; almost every
security issue is a result of the interaction of specific hardware and software;
with sufficient time, developers could resolve all faults.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 44
Security as a Social Science

• Social science examines the behavior of individuals interacting with systems.


• Security begins and ends with the people that interact with the system,
intentionally or otherwise.
• Security administrators can greatly reduce the levels of risk caused by end
users and create more acceptable and supportable security profiles.

Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 45
Summary (1 of 4)

• Information security evolved from the early field of computer security.


• Security is protection from danger. There are many types of security: physical
security, personal security, operations security, communications security,
national security, and network security, to name a few.
• Information security is the protection of information assets that use, store, or
transmit information through the application of policy, education, and technology.
• The critical characteristics of information, including confidentiality, integrity, and
availability (the C.I.A. triad), must be protected at all times. This protection is
implemented by multiple measures that include policies, education, training and
awareness, and technology.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 46
Summary (2 of 4)

• Information systems are made up of the major components of hardware,


software, data, people, procedures, and networks.
• Upper management drives the top-down approach to security implementation,
in contrast with the bottom-up approach or grassroots effort, in which individuals
choose security implementation strategies.

Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 47
Summary (3 of 4)

• The control and use of data in the organization is accomplished by the following
parties:
− Data owners, who are responsible for the security and use of a particular set
of information
− Data custodians, who are responsible for the storage, maintenance, and
protection of the information
− Data trustees, who are appointed by data owners to oversee the
management of a particular set of information and to coordinate with data
custodians for its storage, protection, and use
− Data users, who work with the information to perform their daily jobs and
support the mission of the organization
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 48
Summary (4 of 4)

• Each organization has a culture in which communities of interest are united by


similar values and share common objectives. The three communities in
information security are general management, IT management, and information
security management.
• Information security has been described as both an art and a science, and it
comprises many aspects of social science as well.

Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 49
Self-Assessment

• What is information security?


• How has the concept of security for the use of computer systems changed over
time?
• Information has many characteristics. What are the most critical of these
characteristics that need to be kept secure?

Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 50

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy