Information Security Dr. Rabie A. Ramadan GUC, Cairo Room C7 -310 Lecture 1.

Slides:



Advertisements
Similar presentations
Advanced Networks and Computer Security Curt Carver & Jeff Humphries © 1999 Texas A&M University.
Advertisements

Chapter 1  Introduction 1 Chapter 1: Introduction.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Lecture Outline 10 INFORMATION SYSTEMS SECURITY. Two types of auditors External auditor: The primary mission of the external auditors is to provide an.
CSA 223 network and web security Chapter one
Security+ Guide to Network Security Fundamentals
Introducing Computer and Network Security
FIT3105 Security and Identity Management Lecture 1.
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Summary of Lecture 1 Security attack types: either by function or by the property being compromised Security mechanism – prevention, detection and reaction.
7.2 System Development Life Cycle (SDLC)
Computer Security: Principles and Practice
Factors to be taken into account when designing ICT Security Policies
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Risk Management Vs Risk avoidance William Gillette.
Security Architecture Dr. Gabriel. Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Author: Andy Reedftp://topsurf.co.uk/reed FdSc IT/Computer Networking & IT(e-commerce) Communications Network Management An Introduction to Security.
SEC835 Database and Web application security Information Security Architecture.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Computer Engineering II Computer and Network Security Rabie A. Ramadan
1 Introduction to Information Security. 2 Historical aspects of InfoSec Critical characteristics of information CNSS security model Systems development.
BUSINESS B1 Information Security.
Information Security Rabie A. Ramadan GUC, Cairo Room C Lecture 2.
Introducing Computer and Network Security. Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Computer Engineering 1 nd Semester Dr. Rabie A. Ramadan 1.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 - Databases, Controls, and Security.
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
CREATE THE DIFFERENCE Data and Information (Special thanks to Janet Francis for this presentation)
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Introduction.
Chap1: Is there a Security Problem in Computing?.
12/18/20151 Computer Security Introduction. 12/18/20152 Basic Components 1.Confidentiality: Concealment of information (prevent unauthorized disclosure.
CONTROLLING INFORMATION SYSTEMS
Computer Security By Duncan Hall.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
CPT 123 Internet Skills Class Notes Internet Security Session B.
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 1: Why Study Information Security?
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Philip J. Beyer, Information Security Officer John P. Skaarup, Sr. Security Engineer Texas Education Agency Information Security.
Information Systems Security
Computer Security Introduction
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Information Security, Theory and Practice.
Data and database administration
Secure Software Confidentiality Integrity Data Security Authentication
CS 450/650 Fundamentals of Integrated Computer Security
Data & Network Security
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Lorenzo Biasiolo 3°AI INFORMATION SECURITY.
Introduction to Course
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Information Security Dr. Rabie A. Ramadan GUC, Cairo Room C Lecture 1

Class Organization One class Weekly One Tutorial Weekly Most probably taught by myself 3-4 theoretical assignments 3-4 practical assignments (Labs) Term paper / project 2

Textbooks Michael G. Solomon and Mike chapple, Information Security Illuminated, 2005 William Stallings, Cryptography and Network Security, fourth Edition Behrouz A. Forouzan, “Cryptography and Network Security,” 2008 Edition Some other research materials 3

Tentative Grading 40% Final – comprehensive 20% Mid-term exam 5% Assignments 5% Lecture participation 20% Project / Term paper 10% Quizzes 2 out of 3 4

Lets have fun before we start 5

Game No. 1 Study the circles below. Work out what number should replace the question mark.

7 Hit 4 * 5 + 3* 6 = 38 8 * * 5 = 47

Game No. 2 Draw a square made up of dots like this one on your piece of paper Now, without lifting the pencil from the page, draw no more than four straight lines which will cross through all nine dots

Hint One line can go out of the paper

Solution Lessons Learned Do not discard small details Ask questions You might think that things are very complicated but with little guide it becomes very easy

Video Part 11 Play What does it tell you? Be Smart and Think Smartly

The Role of Security Security is like adding brakes to cars. The purpose of brakes is not to stop you; it is to enable you to go faster. Brakes help avoid accidents caused by mechanical failures in other cars, rude drivers, and road hazards. Better security is an enabler for greater freedom and confidence in the Cyber world. 12

Why Information Security? Play 13

Historical Aspects of InfoSec In old days, to be secure, Information maintained physically on a secure place Few authorized persons have access to it (confidentiality) Protected from unauthorized change (integrity) Available to authorized entity when is needed (availability) Nowadays, Information are stored on computers Confidentiality are achieved  few authorized persons can access the files. Integrity is achieved  few are allowed to make change Availability is achieved  at least one person has access to the files all the time 14

Historical Aspects of InfoSec In the 1970s, Federal Information Processing Standards (FIPS) examines DES (Data Encryption Standard) for information protection DARPA creates a report on vulnerabilities on military information systems in 1978 In 1979 two papers were published dealing with password security and UNIX security in remotely shared systems In the 1980s the security focus was concentrated on operating systems as they provided remote connectivity 15

16 Historical Aspects of InfoSec In the 1990s, the growth of the Internet and the growth of the LANs contributed to new threats to information stored in remote systems IEEE, ISO, ITU-T, NIST and other organizations started developing many standards for secure systems Information security is the protection of information,the systems, and hardware that use, store, and transmit information

17 CNSS Model CNSS stands for Committee on National Security Systems (a group belonging to the National Security Agency [NSA]). CNSS has developed a National Security Telecommunications and Information Systems Security (NSTISSI) standards. NSTISSI standards are 4011, 4012, 4013, 4014, 4015, 4016.

18 CNSS Security Model Storage Processing Transmission Confidentiality Integrity Availability Technology Education Policy

19 CNSS Security Model The model identifies a 3 x 3 x 3 cube with 27 cells Security applies to each of the 27 cells These cells deal with people, hardware, software, data, and procedures A hacker uses a computer (hardware) to attack another computer (hardware). Procedures describe steps to follow in preventing an attack. An attack could be either direct or indirect In a direct attack one computer attacks another. In an indirect attack one computer causes another computer to launch an attack.

20 Systems Development Life Cycle for InfoSec (SDLC) SDLC for InfoSec is very similar to SDLC for any project The Waterfall model would apply to InfoSec as well Investigate Analyze Logical Design Physical Design Implement Maintain

21 Systems Development Life Cycle for InfoSec Investigation phase involves feasibility study based on a security program idea for the organization Analysis phase involves risk assessment Logical design phase involves continuity planning, disaster recovery, and incident response Investigate Analyze Logical Design Physical Design Implement Maintain

Systems Development Life Cycle for InfoSec Physical design phase involves considering alternative options possible to construct the idea of the physical design Maintenance phase involves implementing the design, evaluating the functioning of the system, and making changes as needed 22 Investigate Analyze Logical Design Physical Design Implement Maintain

23 What is a Computer Security? Different answers It is the password that I use to enter the system or required set of rules (lock the computer before you leave) – End User It is the proper combination of firewall technologies with encryption systems and access controls – Administrator Keeping the bad guys out of my computer– Manager 23

What is a computer security? A computer is secure if you can depend on it and its software to behave as you expect– Simson and Gene in “Practical Unix and Internet Security “ book Which definition is correct ? All of them. However, We need to keep all of these prospective in mind 24

CIA Triad Security Goals Confidentiality, Integrity, and Availability 25

Confidentiality The property of preventing disclosure of information to unauthorized individuals or systems. Real Scenario a credit card transaction on the Internet requires the credit card number to be transmitted from the buyer to the merchant and from the merchant to a transaction processing network. The system attempts to enforce confidentiality by encrypting the card number during transmission, by limiting the places where it might appear (in databases, log files, backups, printed receipts, and so on), and by restricting access to the places where it is stored. If an unauthorized party obtains the card number in any way, a breach of confidentiality has occurred. 26 To ensure confidentiality

Integrity Data cannot be modified without authorization. Real scenarios: Integrity is violated when an employee (accidentally or with malicious intent) deletes important data files, when a computer virus infects a computer, when an employee is able to modify his own salary in a payroll database, when an unauthorized user vandalizes a web site, when someone is able to cast a very large number of votes in an online poll, and so on. Preventing by Access Control and Encryption 27

Availability The information must be available when it is needed. High availability systems aim to remain available at all times. Real Scenarios Power outages, hardware failures, DoS attacks (denial-of-service attacks). Preventions by fault tolerance, access control, and attack prevention mechanisms. 28

Security Goals (Summary) 29 Confidentiality Ensures that computer-related assets are accessed only by authorized parties. Sometimes called secrecy or privacy. Integrity Assets can be modified only by authorized parties or only in authorized ways. Availability assets are accessible to authorized parties at appropriate times. The opposite is denial of service.

Security Goals 30 Strong protection is based on Goals relations