When the tides of life turn against you... And the current upsets your boat... Don't waste those tears on what might have been... Just lay on your back and float!...

Lecture 1 ~ Introduction to Information Security ~

Assalamualaikum w.b.t

First lecture encek ajr Introduction to Information Security.. Nie semue intro ajer dulu... Antara topics lam lecture 1 nie : -
~What is security?
~Security Architecture
~Security Principles
~Security Policy
~Security Attacks / Threats
~Methods of Defense
~Security Services
~Security Mechanisms

What is Security ?
Definition:
~Security is the quality or state of being secure that is to be free from danger and to be protected from adversaries – from those who would do harm, intentionally or otherwise
Information Security:
~Information Security is the protection of information and the systems and hardware that use, store, and transmit that information

Security Trends



Security Area


Security Architecture
~Defined by ITU-T Recommendation X.800 that called OSI Security Architecture.
~Useful to managers as a way of organizing the task of providing security
~Architecture was developed as an international standard, computer and communications vendors have developed security features for their products and services that relate to the structured definition of services and mechanisms.
~Focuses on security attacks, security mechanisms and security services.

Security Principles



Security Policy
~Set of rules to apply to security relevant activities in a security domain
~Level of security policy: objectives, organizational and system.
~Key aspects of security policy: authorization, access control policy, accountability


Security Attacks / Threats


Passive Attacks : Release of Message Contents



Passive Attacks : Traffic Analysis



Active Attacks : Masquerade



Active Attacks : Replay



Active Attacks : Modification of Messages



Active Attacks : Denial of Service



Passive Attack vs. Active Attack
Passive Attack :
~Very difficult to detect. Why?
~Feasible to prevent the success of these attacks. How?
~Emphasis in dealing with passive attacks is on prevention rather than detection. Why?

Active Attacks :
~Quite difficult to prevent active attacks. Why?
~Instead, the goal is to detect active attacks and to recover from any disruption or delays caused by them.
~If the detection has a deterrent effect, it may also contribute to prevention.

Methods of Defense
~We can deal with harm that occurs when a threat is realized against a vulnerability in several ways:
~Prevent it, by blocking the attack or closing the vulnerability.
~Deter it, by making the attack harder, but not impossible.
~Deflect it, by making another target more attractive.
~Detect it, either as it happens or some time after the fact.
~Recover from its effects.

Methods of Defense:Controls
~Encryption
~Software Controls - access limitations in a data base, in operating system protect each user from other users
~Hardware Controls –smartcard
~Policies - frequent changes of passwords
~Physical Controls

Methods of Defense:Software Controls
Program controls include:
~Internal program controls: part of the program that enforce security restrictions, such as access limitations in a database management program.
~Operating system and network system controls: limitations enforced by the operating system or network to protect each user from all other users.
~Independent control programs: application programs, such password checkers, intrusion detection utilities or virus scanners, that protect against certain types of vulnerabilities.
~Development controls: quality standards under which a program is designed, coded, tested and maintained, to prevent software faults from becoming exploitable vulnerabilities

Methods of Defense:Hardware Controls
Numerous hardware devices have been created to assist in providing computer security. These devices include a variety of means, such as:
>Hardware or smart card implementations of encryption
>Locks or cables limiting access or deterring theft
>Devices to verify user’s identities
>Firewalls
>Intrusion detection systems
>Circuit boards that control access to storage media

Methods of Defense:Policies & Procedure Controls
~Controls can also be in place based on agreed-upon procedures or policies among users, rather than enforcing security through hardware or software means.
~Training and administration follow immediately after establishment of policies, to reinforce the importance of security policy and to ensure their proper use.

Methods of Defense:Encryption Controls
~Encryption is the formal name for scrambling data so that interpretation is meaningless without the intruder’s knowing how the scrambling was done.
~Encryption can virtually nullify the value of an interception and the possibility of effective modification or fabrication.
*It clearly addresses the need for confidentiality of data.
*It also can be used to ensure integrity.
~Encryption is the basis of protocols that enable us to provide security while accomplishing an important system or network task.

Methods of Defense:Effectiveness of Controls
~Principle of effectiveness: Controls must be used and used properly to be effective.
~There are several aspects that can enhance the effectiveness of controls:
*Awareness of problem
*Likelihood of use
*Overlapping controls
*Periodic review

Security Services
Defined by X.800:
~A security service as a service provided by a protocol layer of communicating open systems which ensure adequate security of the systems or of data transfers.
Defined by RFC 2828:
~A processing or communication service that is provided by a system to give a specific kind of protection to system resources where security services implement security policies and are implemented by security mechanisms.

~Authentication - assurance that the communicating entity is the one claimed
~Access Control - prevention of the unauthorized use of a resource
~Data Confidentiality –protection of data from unauthorized disclosure
~Data Integrity - assurance that data received is as sent by an authorized entity
~Non-Repudiation - protection against denial by one of the parties in a communication

Security Services: 5 Categories & 14 Specific Services



Security Services:Data Integrity



Security Services:Data Confidentiality



Security Services:Authentication



Security Services:Nonrepudiation



Security Mechanism
~Security mechanism is any process (or a device incorporating such a process) that is designed to detect, prevent or recover from a security attack.
~Security mechanisms exist to provide and support security services and was defined by X.800
~Divided into two classes: those that are implemented in a specific protocol layer and those that are not specific to any particular protocol layer or security services
*Specific Security Mechanisms
*Pervasive Security Mechanisms

Lecture Summary
~Due to the technology era today, information security is made more importance implemented in most of organization.
~Studying information security is also importance due to the demand career in this area.
~Most of the major requirements for security services can be given self-explanatory one word labels:
*Confidentiality, authentication, nonrepudiation, integrity

hmm... tue jer la pengenalan tentang Information Security nie... Laen lecture kiter juper lg encek... yuhuuuu...

"Great minds discuss ideas, normal minds discuss events, small minds discuss people."

0 komplen:

Post a Comment

Related Posts with Thumbnails