330 likes | 408 Views
Understand the core principles and components of information security, including confidentiality, integrity, and availability. Explore key concepts like authentication, authorization, and access control to protect valuable organizational assets.
E N D
Information Security Management 2017-Shariaty University
Information Security Management Final Exam : 13 point Exercises/class activity : 2 point Quiz : 1 point Presentation: 4 point (time(20’), file, lecture) Extra point: 2 point (Paper) Semester Definition
INFOSEC Section 1 Information Security Management
'Information is an asset which, like other important business assets, has value to an organization and consequently needs to be suitably protected’BS ISO 27002:2005
Information can be • Displayed • Transmitted by post or using electronics means • Shown on corporate videos • Displayed / published on web • Stolen • Printed or written on paper • Stored electronically • Created • Stored • Destroyed • Processed • Transmitted • Used (for proper or improper proposes) • Corrupted • Lost ‘…Whatever form the information takes, or means by which it is shared or stored, it should always be appropriately protected’ (BS ISO 27002:2005)
What is Security? “The quality or state of being secure--to be free from danger”
What Is Security? • A successful organization should have multiple layers of security in place: • Physical security • Personal security • Operations security • Communications security • Network security • Information security
What Is Information Security? • Deals with several different "trust" aspects of information and its protection • The U.S. Government’s National Information Assurance Glossary defines INFOSEC as: “Protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users or the provision of service to unauthorized users, including those measures necessary to detect, document, and counter such threats.”
What Is Information Security? • Three widely accepted elements or areas of focus (referred to as the “CIA Triad”): • Confidentiality • Integrity • Availability (Recoverability)
What Is Information Security? • The protection of information and its critical elements, including systems and hardware that use, store, and transmit that information • Necessary tools: policy, awareness, training, education, technology • C.I.A. triangle was standard based on confidentiality, integrity, and availability • C.I.A. triangle now expanded into list of critical characteristics of information
Confidentiality Secure Integrity Availability What Is Information Security? Over time the list of characteristics has expanded, but these three remain central
Confidentiality • Confidentiality of information ensures that only those with sufficient privileges may access certain information • To protect confidentiality of information, a number of measures may be used including: • Information classification • Secure document storage • Application of general security policies • Education of information custodians and end users
Integrity • Integrity is the quality or state of being whole, complete, and uncorrupted • The integrity of information is threatened when it is exposed to corruption, damage, destruction, or other disruption of its authentic state • Corruption can occur while information is being compiled, stored, or transmitted
Availability • Availability is making information accessible to user access without interference or obstruction in the required format • A user in this definition may be either a person or another computer system • Availability means availability to authorized users
Key Concepts of Information Security • Authentication • Authentication occurs when a control provides proof that a user possesses the identity that he or she claims
Authentication • Authentication deals with verifying the identity of a subject while access control deals with the ability of a subject (individual or process running on a computer system) to interact with an object (file or hardware device). • Three types of authentication • Something you know (password) • Something you have (token or card) • Something you are ( biometric)
Key Concepts of Information Security • Authorization • After the identity of a user is authenticated, a process called authorization provides assurance that the user (whether a person or a computer) has been specifically and explicitly authorized by the proper authority to access, update, or delete the contents of an information asset
Access Control vs. Authentication • Authentication – This proves that you (subject) are who you say you are. • Access control – This deals with the ability of a subject to interact with an object. • Once an individual has been authenticated, access controls then regulate what the individual can actually do on the system.
Key Concepts of Information Security • Accountability: • generates the requirement for actions of an entity to be traced uniquely to that individual to support nonrepudiation, deference, fault isolation, etc
The Operational Method of Computer Security • Protection = Prevention • Previous model • Protection = Prevention + (Detection + Response) • Includes operational aspects
Sample Technologies in the Operational Model of Computer Security
Components of an Information System • To fully understand the importance of information security, you need to know the elements of an information system • An Information System (IS) is much more than computer hardware; it is the entire set of software, hardware, data, people, and procedures necessary to use information as a resource in the organization
Securing the Components • The computer can be either or both the subject of an attack and/or the object of an attack • When a computer is • the subject of an attack, it is used as an active tool to conduct the attack • the object of an attack, it is the entity being attacked
Balancing Security and Access • Security should be considered a balance between protection and availability • To achieve balance, the level of security must allow reasonable access, yet protect against threats
It is impossible to obtain perfect security - it is not an absolute; it is a process