Information Security What is Information Security?

Slides:



Advertisements
Similar presentations
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
Advertisements

Overview of IS Controls, Auditing, and Security Fall 2005.
Lecture 1: Overview modified from slides of Lawrie Brown.
CSA 223 network and web security Chapter one
Note1 (Intr1) Security Problems in Computing. Overview of Computer Security2 Outline Characteristics of computer intrusions –Terminology, Types Security.
1 An Overview of Computer Security computer security.
Introducing Computer and Network Security
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Lecture 11 Reliability and Security in IT infrastructure.
Lesson 1-What Is Information Security?. Overview History of security. Security as a process.
Information Assurance and Security: Overview. Information Assurance “Measures that protect and defend information and information systems by ensuring.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Security Architecture Dr. Gabriel. Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding.
Introduction to Network Defense
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
SEC835 Database and Web application security Information Security Architecture.
Storage Security and Management: Security Framework
Kittiphan Techakittiroj (04/09/58 19:56 น. 04/09/58 19:56 น. 04/09/58 19:56 น.) Network Security (the Internet Security) Kittiphan Techakittiroj
HIPAA COMPLIANCE WITH DELL
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
BUSINESS B1 Information Security.
Information Security Rabie A. Ramadan GUC, Cairo Room C Lecture 2.
Introducing Computer and Network Security. Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re.
1 Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
Security Architecture
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
Security Mark A. Magumba. Definitions Security implies the minimization of threats and vulnerabilities A security threat is a harmful event or object.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Sensitive Metric Collection and Reporting System Michael Aiello Hanning Gao Martin Goldberg Michael Sosonkin Jason Woloz.
Operating system Security By Murtaza K. Madraswala.
Lesson 7-Managing Risk. Overview Defining risk. Identifying the risk to an organization. Measuring risk.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
IT Risks and Controls Revised on Content Internal Control  What is internal control?  Objectives of internal controls  Types of internal controls.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Chap1: Is there a Security Problem in Computing?.
Database security Diego Abella. Database security Global connection increase database security problems. Database security is the system, processes, and.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Computer Security By Duncan Hall.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Computer threats, Attacks and Assets upasana pandit T.E comp.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
UNIT-4 Computer Security Classification 2 Online Security Issues Overview Computer security – The protection of assets from unauthorized access, use,
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Database Security Threats. Database An essential corporate resource Data is a valuable resource Must be strictly controlled, managed and secured May have.
CS457 Introduction to Information Security Systems
Risk management.
Network Security (the Internet Security)
Operating system Security
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Answer the questions to reveal the blocks and guess the picture.
NET 311 Information Security
INFORMATION SYSTEMS SECURITY and CONTROL
Network Security Ola Flygt Växjö University
Mohammad Alauthman Computer Security Mohammad Alauthman
Chapter 1 Key Security Terms.
Presentation transcript:

Information Security What is Information Security?

Information Security Information Security preventative steps informationcapabilities Information Security is the name given to the preventative steps we take to guard our information and our capabilities. Measures adopted to prevent the unauthorized use, misuse, modification, or denial of use of knowledge, facts,data or capabilities.

Critical Characteristics of Information Availability Accuracy Authenticity Confidentiality Integrity

Availability access interference requiredformat. Enables users who need to access information to do so without interference and receive it in required format. available authorized The information is available only to the authorized users.

Accuracy free from mistakes Information is accurate when it is free from mistakes or errors and it has the value that the end user expects.

Authenticity genuine or original, Authenticity of information is the quality or state of being genuine or original, rather than a reproduction or fabrication. Spoofing e.g. Spoofing The unauthorized use of a third-party domain name as the sender's name in an e- mail message The unauthorized use of a third-party domain name as the sender's name in an e- mail message

Confidentiality rightful access. Information is available only to people with rightful access. rights privilegesaccess Ensuring that only those with the rights and privileges to access a particular set of information are able to do so. privacy It is closely related with the privacy of information.

Integrity changed authorized Information can only be changed by authorized personnel. whole, complete uncorrupted The quality or state of being whole, complete and uncorrupted is the integrity of information. Integrity check can be done through: File size File hashing Hashing is the transformation of a string of character s into a usually shorter fixed-length value or key that represents the original string

Components of an Information System Software Hardware Data People Procedures

Software OS,Applicationscommand utilities Comprises of OS,Applications and command utilities. BugsWeaknessesHoles Bugs,Weaknesses and Holes. An error or defect in software or hardware that causes a program to malfunctionsoftwarehardwareprogram Security Hole( something you need to fix now) Security Warning( something you need to fix soon) Security Note (something you need to fix when you get around to it, or just some information that you should consider) Service PacksPatchesHot fixes Service Packs,Patches and Hot fixes. least Priority Security is least Priority in Software development

Hardware HousesExecutes Houses and Executes a software. Stores and carries the data. Interfaces Provides Interfaces for the entry and removal of information from the system. Physical security policies deal with the H/W Physical security policies deal with the H/W.

Data Mainintentional Main object of intentional attacks

People Main threat Main threat to information security. Overlooked Often Overlooked

Procedures written instructions accomplishingtask Procedures are written instructions for accomplishing a specific task. overlooked Another frequently overlooked component

What is Network Security? secure computingplatform cannot perform actions  Effort to create a secure computing platform, so users or programs cannot perform actions that they are not allowed to do. protection networking componentsconnections contents  Network Security is the protection of networking components, connections and contents.

Network Security as a Continuous Process continuous process Network security is a continuous process built around a security policy. Step 1: Secure Step 2: Monitor Step 3: Test Step 4: Improve

Step 1: Secure the Network prevent unauthorized accessprotect information. Implement security solutions to prevent unauthorized access and to protect information. Authentication Encryption Firewalls Vulnerability Patching

Step 2: Monitor Security Detects violations Detects violations to the security policy system auditingintrusion detection Involves system auditing and real-time intrusion detection Validatessecurity Validates the security implementation in Step 1

Step 3: Test Security Validates effectiveness network scanning Validates effectiveness of the security policy through system auditing and network scanning

Step 4: Improve Security improvements Use information from the monitor and test phases to make improvements to the security implementation. security holes risks Adjust the security policy as security holes and risks are identified.

Terms related to Security  Assets Threats Attack Vulnerability Risk Analysis Countermeasures Hacking

Asset organizational resource An asset is the organizational resource that is being protected. logical It can be logical like website, information, data. physical It can be physical like computer system or other tangible object.

Threats, Vulnerability and Controls Threat a person, thing, event or idea which poses some danger to an asset (in terms of confidentiality, integrity, availability). a possible means by which a security policy may be breached. An attack is a realisation of a threat. Vulnerability A weakness in the system that can be exploited to cause loss or harm Control, Countermeasure, safeguard An action, device, procedure or technique that removes or reduces a vulnerability.

Risk = Threat + Vulnerability Threats without vulnerabilities pose no risk. Likewise, vulnerabilities without threats pose no risk. Risk is the probability that something can happen. Risk analysis can be quantitative or qualitative.

Cont… Risk can be qualitatively defined in three levels: Low Low- Action to remove the vulnerability should be taken if possible Medium Medium- Action to remove the vulnerability is advisable High- High- Action should be taken immediately to remove this vulnerability

Hacking Can be defined positively and negatively: To write computer programs for enjoyment. To gain access to a computer illegally.

Summary What is Information Security? What is Network Security? Assets, Threats and Countermeasures