PoIS 7E PPT - Module 01a
PoIS 7E PPT - Module 01a
Introduction to Information
Security
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 1
Icebreaker: Interview Simulation
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 2
Module Objectives
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 3
Introduction
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 4
The History of Information Security
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 6
The 1960s
• During the Cold War, many more mainframe computers were brought online to
accomplish more complex and sophisticated tasks.
• The Advanced Research Projects Agency (ARPA) began to examine the
feasibility of a redundant networked communication system.
• Larry Roberts led the development of the ARPANET, which evolved into what
we now know as the Internet.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 10
Development of the ARPANET
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 11
The 1970s and ’80s (1 of 2)
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 12
The 1970s and ’80s (2 of 2)
• Information security began with RAND Report R-609—the paper that started the
study of computer security and identified the role of management and policy
issues in it.
• The scope of computer security grew from physical security to include:
− Securing the data
− Limiting random and unauthorized access to data
− Involving personnel from multiple levels of the organization in information
security
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 13
Computer Network Vulnerabilities
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 14
MULTICS
• Early research on computer security research centered on a system called
Multiplexed Information and Computing Service (MULTICS).
• The first operating system was created with security integrated into core
functions.
• Mainframe, time-sharing OS was developed in the mid-1960s by General
Electric (GE), Bell Labs, and Massachusetts Institute of Technology (MIT).
• Several MULTICS key players created UNIX.
− The primary purpose of UNIX was text processing.
• Late 1970s: The microprocessor expanded computing capabilities and security
threats.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 15
The 1990s
• Networks of computers became more common, as did the need to connect them
to each other.
• The Internet became the first global network of networks.
• Initially, network connections were based on de facto standards.
• In early Internet deployments, security was treated as a low priority.
• In the late 1990s and into the 2000s, many large corporations began publicly
integrating security into their organizations.
Information security began to emerge as an independent discipline.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 16
2000 to Present
• What is Security?
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 18
What Is Security?
• “A state of being secure and free from danger or harm; the actions taken to
make someone or something secure.”
• “The protection of information and its critical elements, including systems and
hardware that use, store, and transmit that information” (CNSS).
• InfoSec Includes information security management, data security, and network
security.
• C.I.A. triad of confidentiality, integrity, and availability:
− Is a standard based on confidentiality, integrity, and availability, now viewed
as inadequate.
− Expanded model consists of a list of critical characteristics of information
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 19
Knowledge Check Activity 1
What is security?
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 20
Knowledge Check Activity 1: Answer
What is security?
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 21
Components of Information Security
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 22
The C.I.A. Triad
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 23
Key Information Security Concepts
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 24
Key Concepts in Information Security
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 25
Critical Characteristics of Information
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 26
CNSS Security Model
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 27
Components of an Information System
• An information system (IS) is the entire set of hardware, software data, people,
procedures, and networks that enable a business to use information.
• All of them work together to support personal and professional operations.
• Each one has its own strengths and weaknesses, as well as its own
characteristics and uses.
• Each one has its own security requirements.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 28
Components of an Information System
• An information system (IS) is
Software entire set of people, procedures,
and technology that enable
Networks Hardware
business to use information.
– Software
Information
System
– Hardware
– Data
– People
Procedures Data
– Procedures
People
– Networks
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be 29
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 29
Balancing Information Security and Access
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 30
Approaches to Information Security
Implementation: Bottom-Up Approach
• Grassroots effort: systems administrators work to improve security of their
systems.
• Key advantage: technical expertise of individual administrators
• Seldom works, as it lacks a number of critical features:
− Participant support
− Organizational staying power
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 31
Approaches to Information Security
Implementation: Top-Down Approach
• Initiated by upper management
− Issue policy, procedures, and processes
− Dictate goals and expected outcomes of project
− Determine accountability for each required action
• The most successful type of top-down approach also involves a formal
development strategy referred to as a systems development life cycle.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 32
Approaches to Information Security
Implementation
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 33
Security Professionals and the Organization
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 34
Senior Management
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 35
Knowledge Check Activity 2
What title is given to the person with primary responsibility for assessment,
management, and implementation of InfoSec in the organization?
a. CIO
b. CISO
c. CEO
d. CFO
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 36
Knowledge Check Activity 2: Answer
What title is given to the person with primary responsibility for assessment,
management, and implementation of InfoSec in the organization?
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 37
The CISO’s Place and Roles
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 38
Information Security Project Team
• A small functional team of people who are experienced in one or multiple facets
of required technical and nontechnical areas:
− Champion
− Team leader
− Security policy developers
− Risk assessment specialists
− Security professionals
− Systems administrators
− End users
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 39
Data Responsibilities
• Data owners/ Data Controller: senior management responsible for the security
and use of a particular set of information
• Data custodian/ Data Processor: responsible for information and systems that
process, transmit, and store it
• Data trustees/ Data Protection Officer (DPO): appointed by data owners to
oversee the management of a particular set of information and to coordinate
with data custodians for its storage, protection, and use
• Data Users/ Subject: have access to information and thus an information
security role
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 40
Knowledge Check Activity 3
a. Data owners
b. Data custodian
c. Data trustee
d. Data user
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 41
Knowledge Check Activity 3: Answer
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 42
Communities of Interest
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 43
Information Security: Is It an Art or a
Science?
• Implementation of information security is often described as a combination of art
and science.
• “Security artisan” idea: based on the way individuals perceive system
technologists and their abilities
• Security as art: no hard and fast rules nor many universally accepted complete
solutions; no manual for implementing security through entire system
• Security as science: technology is developed by scientists and engineers;
specific conditions cause virtually all actions in computer systems; almost every
security issue is a result of the interaction of specific hardware and software;
with sufficient time, developers could resolve all faults.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 44
Security as a Social Science
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 45
Summary (1 of 4)
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 47
Summary (3 of 4)
• The control and use of data in the organization is accomplished by the following
parties:
− Data owners, who are responsible for the security and use of a particular set
of information
− Data custodians, who are responsible for the storage, maintenance, and
protection of the information
− Data trustees, who are appointed by data owners to oversee the
management of a particular set of information and to coordinate with data
custodians for its storage, protection, and use
− Data users, who work with the information to perform their daily jobs and
support the mission of the organization
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 48
Summary (4 of 4)
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 49
Self-Assessment
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 50