Security Standard PPT - 1&2
Security Standard PPT - 1&2
Accuracy- free from mistake or error and having the value that the
end-user expects. If information contains a value different from the
user’s expectations due to the intentional or unintentional
modification of its content, it is no longer accurate.
1. Confidentiality
ensures information is inaccessible to
unauthorized people
I
2. Integrity
ensures the data is accurate and trustworthy C
by preventing unauthorized modification
3. Availability A
ensures authorized people can access the
information when needed
What is Information Security?
• When Information Security experts are developing policies
and procedures for an effective information security
program, they use the CIA triad as a guide. The
components of the CIA triad are:
• Confidentiality: ensures information is inaccessible to
unauthorized people—most commonly enforced through
encryption—which is available in many forms
• Integrity: protects information and systems from being modified
by unauthorized people; ensures the data is accurate and
trustworthy
• Availability: ensures authorized people can access the
information when needed and that all hardware and software are
maintained properly and updated when necessary
The CIA triad has become the de facto standard model for
keeping your organization secure. The three fundamental
principles help build a vigorous set of security controls to
preserve and protect your data.
What is an Information System?
A set of interrelated elements or components that collect (input), manipulate and
store (process), disseminate (output) data and information, and provide a feedback
mechanism to meet an objective.
• Hardware
• Software
• Network
• People
• Information
Components of IS (information Security)
Policies, Standards, and Practices
Key Information Security Concepts
• Access - a subject or object’s ability to use, manipulate, modify, or affect
another subject or object.
• Asset - the organizational resource that is being protected.
• Attack - an act that is an intentional or unintentional attempt to cause
damage or compromise to the information and/or the systems that support
it.
• Control, Safeguard, or Countermeasure - security mechanisms, policies, or
procedures that can successfully counter attacks, reduce risk, resolve
vulnerabilities, and otherwise improve the security within an organization.
• Exploit - to take advantage of weaknesses or vulnerability in a system.
• Exposure - a single instance of being open to damage.
• Hack - Good: to use computers or systems for enjoyment; Bad: to illegally
gain access to a computer or system.
• Object - a passive entity in the information system that receives or contains
information.
Key Information Security Concepts
• Risk - the probability that something can happen.
• Security Blueprint - the plan for the implementation of new
security measures in the organization.
• Security Model - a collection of specific security rules that
represents the implementation of a security policy.
• Security Posture or Security Profile - a general label for the
combination of all policies, procedures, technologies, and
programs that make up the total security effort currently in
place.
• Subject - an active entity that interacts with an information
system and causes information to move through the system for a
specific end purpose
• Threats - a category of objects, persons, or other entities that
represents a potential danger to an asset.
• Threat Agent - a specific instance or component of a more
general threat.
• Vulnerability - weaknesses or faults in a system or protection
mechanism that expose information to attack or damage.
Balancing Information Security and Access
In essence, being uninformed and disconnected from global realities can result in missed opportunities, increased
vulnerabilities, and a limited ability to navigate the challenges of our interconnected world. To thrive in this
globalized era, it is essential for you to embrace information and foster connections that transcend geographical
boundaries.
What is Risk?
• An uncertain future event or condition
which, if happens, affects the mission
objective.
A ship is safe in
harbour • Positive and Negative risks.
• Positive risks are called opportunities
but that’s not • Negative risks are threats
These factors vary depending on unforeseen circumstances and features of the information environment. They
are almost impossible to predict in the information space, but you must be prepared to rapidly eliminate them.
Engineering and technical investigation or a response attack will help to mitigate the following problems:
1. System failures:
•Caused by malfunctions of technical means at different levels of processing and storage of information (including
those responsible for system performance and access to it).
•Malfunctions and obsolete elements (demagnetization of data carriers, such as diskettes, cables, connection lines
and microchips).
•Malfunctions of different software that supports all links in the chain of information storage and processing
(antiviruses, application and service programs).
•Malfunctions of auxiliary equipment of information systems (power transmission failures).
2. Activated:
•Malware, illegal programs, technological exits from programs which are together called ‘implant tools’.
•Hardware implants: introduced directly into telephone lines, electrical networks or premises.