Stephen S. Yau CSE465 & CSE591, Fall 2006 1 Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,

Slides:



Advertisements
Similar presentations
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Chap 1: Overview Concepts of CIA: confidentiality, integrity, and availability Confidentiality: concealment of information –The need arises from sensitive.
Lecture 1: Overview modified from slides of Lawrie Brown.
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
1 An Overview of Computer Security computer security.
Chapter 1: Introduction Components of computer security Threats Policies and mechanisms The role of trust Assurance Operational Issues Human Issues Computer.
Applied Cryptography for Network Security
Lesson 1-What Is Information Security?. Overview History of security. Security as a process.
Introduction (Pendahuluan)  Information Security.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Information Assurance and Security: Overview. Information Assurance “Measures that protect and defend information and information systems by ensuring.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Information Security Technological Security Implementation and Privacy Protection.
SEC835 Database and Web application security Information Security Architecture.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”.
N ational I NFOSEC E ducation and T raining P rogram Educational Solutions for a Safer World http//
Cryptography and Network Security
Operations Security (OPSEC) Introduction  Standard  Application  Objectives  Regulations and Guidance  OPSEC Definition  Indicators.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
1 A Comprehensive Framework for Information Assurance Abe Usher, CISSP.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Overview of Key Security Concepts and Vocabulary This Document was Funded by the National Science Foundation Federal Cyber Service Scholarship For Service.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
ACM 511 Introduction to Computer Networks. Computer Networks.
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Quality of Information System (IS) reflecting local correctness and reliability of the operating system; the logical completeness of the hardware and software.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
12/18/20151 Computer Security Introduction. 12/18/20152 Basic Components 1.Confidentiality: Concealment of information (prevent unauthorized disclosure.
Ingredients of Security
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
CONTROLLING INFORMATION SYSTEMS
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
TSP 310-C , Phase II, OCS TSP 310-C , Phase II, OCS Implement OPSEC.
CST 312 Pablo Breuer. measures to deter, prevent, detect, and correct security violations that involve the transmission of information.
UNIT-4 Computer Security Classification 2 Online Security Issues Overview Computer security – The protection of assets from unauthorized access, use,
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Introduction to Information Security Module 1. Objectives Definitions of information technology and information security Fundamental Security Concepts.
Firewalls and Tunneling Firewalls –Acts as a barrier against unwanted network traffic –Blocks many communication channels –Can change the design space.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Information Security and Privacy By: Mike Battestilli.
Computer Security Introduction
CS457 Introduction to Information Security Systems
CS 395: Topics in Computer Security
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Information Security, Theory and Practice.
Information System and Network Security
COMPUTER SECURITY CONCEPTS
Information and Network Security
Security in Networking
INFORMATION SYSTEMS SECURITY and CONTROL
IoTSec Taxonomy Proposal
Computer Security Introduction
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines, policies & laws

Stephen S. Yau CSE465 & CSE591, Fall Basic Concepts of Information Assurance & Security

Stephen S. Yau CSE465 & CSE591, Fall Information Forms and States Information Forms –Thoughts and speech –Hard copy –Softcopy –Personal knowledge –Technical skills –Corporate knowledge –Formal and informal meetings –Telephone conversations –Video teleconferences Information States Transmitted, processed, stored

Stephen S. Yau CSE465 & CSE591, Fall Threats and Vulnerabilities A threat is a potential occurrence that can have an undesirable effect on the system assets or resources [t1- ch1.2, t2- ch1.2] A vulnerability is a weakness that makes a threat to possibly occur [t1-ch20.1, t2- ch23.1]

Stephen S. Yau CSE465 & CSE591, Fall Four Categories of Threats Disclosure: Unauthorized access to information –Snooping Deception: Acceptance of false data –Alteration –Spoofing –Denial of receipt Disruption: Interruption or prevention of correct operations –Alteration Usurpation: Unauthorized control of part of a system –Alteration –Spoofing –Delay –Denial of Service, DDoS t1-ch1.2, t2-ch1.2

Stephen S. Yau CSE465 & CSE591, Fall Necessary Protection In order to secure information, some or all of the following protections of a system are needed –Protect working area from outside intrusion or theft –Store key equipment in secure room, and make sure it works properly –Review programs carefully for potential malicious logic –Keep track of all sensitive files, documents, conference record, experiment results, which may be on printed papers. stored in magnetic storage media, CDs or DVDs. Protect them from unauthorized access. Backup this information periodically in case of system failure –Encrypt sensitive information when storage or transmission. –Choose good passwords and change them periodically –Report abnormal actions immediately

Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) is information operations (IO) that protect and defend information and information systems by ensuring their Information Assurance (IA) is information operations (IO) that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality and nonrepudiation. DoD Definition of Information Assurance

Stephen S. Yau CSE465 & CSE591, Fall Information Characteristics Availability: Timely and reliable access to data and information services for authorized user. Integrity: Protection against unauthorized modification or destruction of information Authentication: Security measure designed to establish validity of transmission, message, or originator, or means of verifying an individual’s authorization to receive specific categories of information t1-ch1.1, t2-ch1.1

Stephen S. Yau CSE465 & CSE591, Fall Information Characteristics (cont.) Confidentiality: Assurance that information is not disclosed to unauthorized persons, processes, or devices. Nonrepudiation: Assurance that sender of data is provided with proof of delivery to recipient, and recipient is provided with proof of sender’s identification. Privacy: Ability and/or right to protect certain personal data; extends ability and/or right to prevent invasion of personal information or space. Extends to families, but not to legal persons, such as corporations, organizations, schools

Stephen S. Yau CSE465 & CSE591, Fall Information Characteristics (cont.) Secrecy: Refers to effect of mechanisms used to limit number of principals who can access information, such as cryptography or computer access control Denial of Service: Mechanisms which prevent legitimate user from using the system.

Stephen S. Yau CSE465 & CSE591, Fall Information System Information system consisting of  Computer systems and networks  Information  Operating environments

Stephen S. Yau CSE465 & CSE591, Fall INFOSEC INFOSEC: Information Systems Security –Protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against denial of service to authorized users or provision of service to unauthorized users, including those measures necessary to detect, document, and counter such threats.

Stephen S. Yau CSE465 & CSE591, Fall OPSEC OPSEC: Operations Security –A process that determines what information adversaries can obtain or piece together from observation and to provide measures for reducing such vulnerabilities to acceptable levels

Stephen S. Yau CSE465 & CSE591, Fall Other Important Terms Orange Book: –The DoD Trusted Computer System Evaluation Criteria (DoD STD) [ –The DoD Trusted Computer System Evaluation Criteria (DoD STD) [t1-ch18.2, t2-ch21.2]Indicators: –Data derived from open sources or from detectable actions that the threat can piece together or interpret to reach conclusions or official estimates concerning friendly intentions, capabilities, or activities. –Data derived from open sources or from detectable actions that the threat can piece together or interpret to reach conclusions or official estimates concerning friendly intentions, capabilities, or activities. Profile indicator Deviation indicator Tip-off indicator

Stephen S. Yau CSE465 & CSE591, Fall Challenges for IA Development of computer and network systems, and information technology expend the need of information to be protected and defended Information becomes most important resource of an organization World is more connected with Internet Information warfare, espionage more common and threatening