Chapter 1
Chapter 1
Introduction to Information
Assurance and Security
11/10/2019 1
Overview of Information assurance & security
(What is security?)
Security is a continuous process of protecting an object from attack. That
object may be a person, an organization such as a business, or property such
as a computer system or a file.
11/10/2019 5
Overview (Cont’d …) Security Goals
Confidentiality: only sender, intended receiver should “understand”
message contents
11/10/2019 7
Overview (Cont’d …) Integrity
To prevent unauthorized modification of resources. It includes the integrity of system
resources, information, and personnel. The alteration of resources like information may be
caused by a desire for personal gain or a need for revenge.
Includes data integrity (content) and origin integrity ( source of data also called
authentication)
Example: Newspaper prints info leaked from White House and gives wrong source
11/10/2019 8
Overview (Cont’d …) Availability
To prevent unauthorized withholding of system resources from those
who need them when they need them.
11/10/2019 9
Enterprise Security
Enterprise security is the process by which an organization protects its information
assets (data, servers, workstations, storage, networking, applications, etc.) from
infringement of Confidentiality , integrity, or availability.
It includes policies and procedures which provide guidance on the who, what, why,
and how to implement the protection mechanism for an organization’s information
assets.
Since Cyber threats are real and they can happen to any organization, Organizations
must now focus much more on information and data:
understanding where it is and how it is managed both within and outside the
enterprise boundary.
11/10/2019 10
Enterprise Security(Cont’d..)
Enterprise security encompasses:
Information security: how information technology supports safe
business practices.
Business security: security processes and the security control
framework, in the context of the business.
Physical security: how facilities and access control support the
logical security model.
Operational risk management: providing a risk-based approach.
11/10/2019 11
Cyber Defense
(what is cyber? What about Cyberspace?)
Cyber is a prefix used to describe a person, thing, or idea as part of the
computer and information age.
Cyber defense is a computer network defense mechanism which includes response
to actions and critical infrastructure protection and information assurance for
organizations, government entities and other possible networks.
Cyber defense focuses on preventing, detecting and providing timely responses to
attacks or threats so that no infrastructure or information is tampered with. With the
growth in volume as well as complexity of cyberattacks, cyber defense is essential
for most entities in order to protect sensitive information as well as to safeguard
assets.
Cyberspace is a domain characterized by the use of electronics and the
electromagnetic spectrum to store, modify, and exchange information.
11/10/2019 12
Cyber Defense
(Cont’d)
PRESENT
Cyber security is a young and immature field
The attackers are more innovative than defenders
FUTURE
Cyber security will become a scientific discipline
It will be application & technology centric
It will never be “solved” but will be “managed”
13
11/10/2019
Cyber Defense
(Cont’d)
Defending schemes:
11/10/2019 15
Cont’’’d
ENTERPRISE ARCHITECTURE
Business Architecture
Security Architecture
Development Order
Information Systems Architecture
Technical Architecture
Reasons for Implementing security
(Why do we need security?)
Increased reliance on Information technology with or with out the use of
networks
Increased use of E-Commerce and the World wide web on the Internet as a
vast repository of various kinds of information (immigration databases,
flight tickets, stock markets etc.)
11/10/2019 17
Reasons (Cont’d …) (Why do we need security?)
Computer Security - the collection of tools designed:
• to protect data/services and
• to prevent hackers
11/10/2019 18
Reasons (Cont’d …) (What if not secured?)
Damage to any IT-based system or activity can result in severe
disruption of services and losses.
Results of Security Breach:
Destruction of Resources
Corruption of Data and Applications
Denial of Services
Theft of Services
Theft of Resources
11/10/2019 19
Reasons (Cont’d …) (That is why…)
we need security
11/10/2019 20
Reasons (Cont’d …) (security controls)
Security controls
Authentication
• Password--- What we know
• Cards---------What we have
• Biometrics--- who we are
Encryption
Administrative procedures
Standards
Physical Security
Laws
11/10/2019 21
Reasons (Cont’d …)(security policy, service &
mechanism )
A security policy is a statement of what is allowed and what is not
allowed.
11/10/2019 22
Reasons (Cont’d …) (security services)
C. Confidentiality (privacy)
11/10/2019 23
//End of chap-1