© G. Dhillon Principles of IS Security Security of Technical Systems in Organizations – an introduction.

Slides:



Advertisements
Similar presentations
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
ECE454/599 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2012.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2012 Lecture 2 08/21/2012 Security and Privacy in Cloud Computing.
Auditing Computer-Based Information Systems
Cryptography and Network Security Chapter 1
Lecture 1: Overview modified from slides of Lawrie Brown.
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Chapter 2.  CIA Model  Host Security VS Network Security  Least Privileges  Layered Security  Access Controls Prepared by Mohammed Saher2.
Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 161 Today’s class Security.
6/2/2015B.Ramamurthy1 Security B.Ramamurthy. 6/2/2015B.Ramamurthy2 Computer Security Collection of tools designed to thwart hackers Became necessary with.
Chapter 1 – Introduction
Security+ Guide to Network Security Fundamentals
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Security Dale-Marie Wilson, Ph.D.. Why Database Security? Data Valuable resource Must be strictly controlled and managed Corporate resource Have strategic.
FIT3105 Security and Identity Management Lecture 1.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Chapter 8 Security Transparencies © Pearson Education Limited 1995, 2005.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Topics in Information Security Prof. JoAnne Holliday Santa Clara University.
C OMPUTER S ECURITY C ONCEPTS By: Qubilah D’souza TE computer.
Chapter 19 Security Transparencies. 2 Chapter 19 - Objectives Scope of database security. Why database security is a serious concern for an organization.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Security Security is a measure of the system’s ability to protect data and information from unauthorized access while still providing access to people.
What does “secure” mean? Protecting Valuables
1 Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Lecture 1: Overview modified from slides of Lawrie Brown.
Cryptography, Authentication and Digital Signatures
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
NETWORK SECURITY. TextBook William Stallings, Cryptography and Network Security: Principles and Practice, ? Edition.
ACM 511 Introduction to Computer Networks. Computer Networks.
Definitions of Business, E- Business, and Risk  Business: An organization involved in trade of goods and/or services to the consumers  E-Business: Application.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
Information Security What is Information Security?
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
Chapter 2 Securing Network Server and User Workstations.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Chap1: Is there a Security Problem in Computing?.
MBA 664 Database Management Dave Salisbury ( )
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
Copyright © 2013 – Curt Hill Computer Security An Overview.
Principles of Information System Security: Text and Cases Gurpreet Dhillon PowerPoint Prepared by Youlong Zhuang University of Missouri-Columbia.
UNIT-4 Computer Security Classification 2 Online Security Issues Overview Computer security – The protection of assets from unauthorized access, use,
Keimyung University 1 Network Control Hong Taek Ju College of Information and Communication Keimyung University Tel:
Information Management System Ali Saeed Khan 29 th April, 2016.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
Introduction to Information Security Module 1. Objectives Definitions of information technology and information security Fundamental Security Concepts.
Computer Security Introduction
Threat Modeling for Cloud Computing
CS 395: Topics in Computer Security
Information Security, Theory and Practice.
Issues and Protections
Design for Security Pepper.
Security
COMPUTER SECURITY CONCEPTS
Security and Administration Transparencies
Information and Network Security
Systems Design Chapter 6.
Security network management
Mohammad Alauthman Computer Security Mohammad Alauthman
Definition Of Computer Security
Presentation transcript:

© G. Dhillon Principles of IS Security Security of Technical Systems in Organizations – an introduction

© G. Dhillon Preamble “….perpetrators don’t have the values assumed by the technologists. They generally stick to the easiest, safest, simplest means to accomplishing their objectives….”[Parker, 1991].

© G. Dhillon Vulnerabilities - 1 Modification When data held in computer systems is accessed in an unauthorized manner and is changed without requisite permissions Destruction When the hardware, software or the data is destroyed because of malicious intent Disclosure When data is made available or access to a software is made available without due consent of the individual responsible of the data or software

© G. Dhillon Vulnerabilities - 2 Interception When an unauthorized person or software gains access to data or computer resources Interruption When a computer system becomes unavailable for use Fabrication When spurious transactions are inserted into a network or records added to an existing database

© G. Dhillon Vulnerability of Computing Resources Computing resourceType of Vulnerability HardwareDestruction; Interception; Interruption SoftwareModification; Interception; Interruption DataDestruction; Interception; Interruption; Fabrication; Modification; Disclosure

© G. Dhillon Data Security Requirements Confidentiality: this requirement ensures privacy of data Integrity: this requirement ensures that data and programs are changed in an authorized manner Availability: this requirement ensures proper functioning of all systems such that there is no denial of service to authorized users Authentication - assures that the message is from a source it claims to be from Non repudiation - prevents an individual or entity from denying having performed a particular action related to data

© G. Dhillon The Confidentiality Attribute DataSoftware ConfidentialityA set of rules to determine if a subject has access to and object Limited access to code Kinds of controlsLabels, encryption, discretionary and mandatory access control, reuse prevention Copyright, patents, labels, physical access control locks Possible lossesDisclosure, inference, espionage Piracy, trade secret loss, espionage

© G. Dhillon The Integrity Attribute DataSoftware IntegrityUnimpaired, complete, whole, correct Unimpaired, everything present and in an ordered manner Kinds of controlsHash totals, check bits, sequence number checks, missing data checks Hash totals, pedigree checks, escrow, vendor assurance sequencing Possible lossesLarceny, fraud, concatenation Theft, fraud, concatenation

© G. Dhillon The Availability Attribute DataSoftware AvailabilityPresent and accessible when and where needed Usable and accessible when and where needed Kinds of controlsRedundancy, back up, recovery plan, statistical pattern recognition Escrow, redundancy, back up, recovery plan Possible lossesDenial of service, failure to provide, sabotage, larceny Larceny, failure to act, interference

© G. Dhillon The Authentication Attribute DataSoftware AuthenticationGenuine. Accepted as conforming to a fact Genuine. Unquestioned origin Kinds of controlsAudit log, verification validation Vendor assurances, pedigree documentation. Hash totals, maintenance log. Serial checks Possible lossesReplacement, false data entry, failure to act, repudiation, deception, misrepresentation Piracy, misrepresentation, replacement, fraud

© G. Dhillon The Non Repudiation Attribute DataSoftware Non repudiationGenuine, true and authentic communication Genuine. True Kinds of controlsAuthentication, validation checks Integrity controls, non modification controls Possible lossesMonetary, loss of identity, disclosure of private information Vulnerability of software code, fraud, misconstrued software

© G. Dhillon Methods of Defense Encryption Software Controls Software Development Controls Operating system controls Program controls Physical Controls

© G. Dhillon Summary CIA + Authentication + Non Repudiation The Principles The principle of easiest penetration The principle of timeliness The principle if effectiveness