01 -Introduction to information security
01 -Introduction to information security
01 -Introduction to information security
Objectives
2
Identifying the Challenges for
Information Security
• Challenge of keeping networks and computers
secure has never been greater
• A number of trends illustrate why security is
becoming increasingly difficult
• Many trends have resulted in security attacks
growing at an alarming rate
3
Identifying the Challenges for
Information Security (continued)
• Computer Emergency Response Team (CERT)
security organization compiles statistics regarding
number of reported attacks, including:
– Speed of attacks
– Sophistication of attacks
– Faster detection of weaknesses
– Distributed attacks
– Difficulties of patching
4
Identifying the Challenges for
Information Security (continued)
5
Defining Information Security
• Information security:
– Information security, sometimes shortened
to InfoSec, is the practice of preventing unauthorized
access, use, disclosure, disruption, modification,
inspection, recording or destruction of information
-wikipedia
6
Defining Information Security
(continued)
• Ensures that protective measures are properly
implemented
• Is intended to protect information
• Involves more than protecting the information itself
7
Defining Information Security
(continued)
8
Defining Information Security
(continued)
• Three characteristics of information must be
protected by information security:
– Confidentiality
– Integrity
– Availability
• Center of diagram shows what needs to be
protected (information)
• Information security achieved through a combination
of three entities
9
Understanding the Importance of
Information Security
• Information security is important to businesses:
– Prevents data theft
– Avoids legal consequences of not securing information
– Maintains productivity
– Foils cyberterrorism
– Thwarts identity theft
10
Preventing Data Theft
11
Preventing Data Theft (continued)
12
Maintaining Productivity
13
Maintaining Productivity (continued)
14
Foiling Cyberterrorism
15
Thwarting Identity Theft
16
Understanding Information Security
Terminology
17
Developing Attacker Profiles
18
Hackers
19
Crackers
20
Script Kiddies
21
Spies
22
Employees
23
Cyberterrorists
24
Cyberterrorists (continued)
25
Identifying Who Is Responsible for
Information Security
• When an organization secures its information, it
completes a few basic tasks:
– It must analyze its assets and the threats these assets
face from threat agents
– It identifies its vulnerabilities and how they might be
exploited
– It regularly assesses and reviews the security policy to
ensure it is adequately protecting its information
26
Identifying Who Is Responsible for
Information Security (continued)
• Bottom-up approach: major tasks of securing
information are accomplished from the lower levels of
the organization upwards
• This approach has one key advantage: the bottom-
level employees have the technical expertise to
understand how to secure information
27
Identifying Who Is Responsible for
Information Security (continued)
28
Identifying Who Is Responsible for
Information Security (continued)
• Top-down approach starts at the highest levels of the
organization and works its way down
• A security plan initiated by top-level managers has
the backing to make the plan work
29
Identifying Who Is Responsible for
Information Security (continued)
30
Understanding Security Principles
31
Layering
• Layered security approach has the advantage of
creating a barrier of multiple defenses that can be
coordinated to thwart a variety of attacks
• Information security likewise must be created in
layers
• All the security layers must be properly coordinated
to be effective
32
Layering (continued)
33
Limiting
• Limiting access to information reduces the threat
against it
• Only those who must use data should have access
to it
• Access must be limited for a subject (a person or a
computer program running on a system) to interact
with an object (a computer or a database stored on a
server)
• The amount of access granted to someone should be
limited to what that person needs to know or do
34
Limiting (continued)
35
Diversity
36
Diversity (continued)
37
Obscurity
38
Simplicity
39
Describe information security careers
40
Summary
41
Summary (continued)
42