INFORMATION
ASSURANCE &
SECURITY 1
MODULE 1
SECURITY
FUNDAMENTALS
OBJECTIVES
Upon completion of this module, the student would be able to:
▪ Define Information Security and its goals;
▪ Demonstrate the abstract view of the components of a goal of security;
▪ Enumerate the types of risks, threats, vulnerability, intrusion and attacks;
▪ Explain the Information Security Controls;
▪ Discuss Security Management Process;
▪ Give different aspects of CIA Triad.
OBJECTIVES
Upon completion of this module, the student would be able to:
▪ Define cryptography;
▪ Discuss encryption and decryption;
▪ Discuss the concepts of steganography and digital signatures;
▪ Explain the process concept of authentication methods;
▪ Describe different states of authentication;
▪ Discuss common security practices
▪ Explain security policy;
▪ Discuss the concept of common security policy and group policy;
INFORMATION SECURITY
CYCLE
What Is Information Security?
Information Security is the state of being
protected against the unauthorized use of
information, especially electronic data, or the
measures taken to achieve this.
What to Protect
Data
Resource
Data Resource
Goals of Security
• Prevention
• Detection
• Recovery
A fundamental understanding of the standard concepts of security is
essential before people can start securing their environment.
Risk
Likelihood: Rare
Damage: Moderate
Disgruntled Former Threat of
Employees Improper Access
A risk is generally defined as the probability that an event will occur.
Threats Intentional or
unintentional
Information Security Threats
Changes to Interruption Interruption Damage to Damage to
Information of Services of Access Hardware Facilities
A threat is a possible danger that might exploit a vulnerability to breach
security and therefore cause possible harm.
Vulnerability
Attacker Unsecured Router Information System
A vulnerability is a weakness which can be exploited by a threat actor, such
as an attacker, to perform unauthorized actions within a computer system.
Intrusion
Intrusions often involves stealing valuable resources and almost always
jeopardize the security of the systems and/or their data.
Attacks
Attack is to set upon in a
Software-Based Attacks
forceful, violent, hostile, Physical Security Attacks
or aggressive way, with
or without a weapon
Social Engineering Attacks Web Application-Based Attacks
Network-Based Attacks
Security Controls
• Controls are the countermeasures that you need to put in place to avoid,
mitigate, or counteract security risks due to threats or attacks.
Detection Control Correction Control
Prevention Control
Security Management Process
CIA Triad
Availability
The CIA Triad is a well-known, venerable model for the development of security
policies used in identifying problem areas, along with necessary solutions in the
arena of information security.
Confidentiality
CONFIDENTIALITY is a concept we deal with frequently in real life. We
expect our doctor to keep our medical records confidential.
There are several technologies that support confidentiality in an
enterprise security implementation. These include the following:
❑Strong encryption
❑Strong authentication
❑Stringent access controls
Integrity
We define INTEGRITY in the information security context as the consistency,
accuracy, and validity of data or information.
Availability
AVAILABILITY is the third core security principle, and it is defined as a
characteristic of a resource being accessible to a user, application, or computer
system when required
AUTHENTICATION
METHODS &
CRYPTOGRAPHY
FUNDAMENTALS
Identification
Identification is defined as the act of determining who someone or what
something is.
Authentication
Authentication is the process of verifying the identity of a person or device.
Authentication Factors
❑Something you are
✓Fingerprints, handprints, or retinal patterns
❑Something you have
✓Key or ID card
❑Something you know
✓Password or PIN
Password
❑Somewhere you are or are not
✓IP address or GPS 24.213.151.4
❑Something you do
✓Keystroke patterns
Authorization
AUTHORIZATION is the process of giving individuals access to system
objects based on their identity.
Non-repudiation
Non-repudiation is the assurance that someone cannot deny the validity
of something.
Access Control
• Determining and assigning privileges to resources, objects, or data.
• Manages authorization.
Access Control Models
Mandatory Access Control Discretionary Access Control Role-Based Access Control
(MAC) (DAC) (RBAC)
Rule-Based Access
Control
Accounting and Auditing
• The process of tracking and recording system activities and resource access.
Common Security Practices
❑Implicit deny
❑Least privilege
❑Separation of duties
❑Job rotation
❑Mandatory vacation
❑Time of day restrictions
❑Privilege management
Implicit Deny
Default Deny
Read Access Granted Write Access Denied
An implicit deny only denies a permission until the user or group is allowed
to perform the permission
Least Privilege
Perform their jobs with User 1 User 4 Perform their jobs with
fewer privileges more privileges
User 2 User 3
Data Entry Clerks Financial Coordinators
LEAST PRIVILEGE is a security discipline that requires that a user, system, or
application be given no more privilege than necessary to perform its function or job.
Separation of Duties
Backup Audit Restore
SEPARATION OF DUTIES is a principle that prevents any single person or entity
from being able to have full access or complete all the functions of a critical or
sensitive process.
Backup
Job Rotation
Audit
Access Control
Firewall Restore
JOB ROTATION is a concept that has employees rotate through
different jobs to learn the procedures and processes in each.
Mandatory Vacation
MANDATORY VACATIONS policies require employees to take time away from their job.
Time of Day Restrictions
AM PM
TIME OF DAY RESTRICTIONS limit when users can access specific systems based on
the time of day or week.
Security Tokens
Unique
PIN
Value
User Password
Information
A security token (or sometimes a hardware token, hard token, authentication
token, USB token, cryptographic token, or key fob) is a physical device that an
authorized user of computer services is given to ease authentication.
Biometrics
❑Fingerprint scanner
❑Retinal scanner
❑Hand geometry scanner
❑Voice-recognition software
❑Facial-recognition software
Biometrics is an authentication method that identifies and recognizes people
based on voice recognition or physical traits such as a fingerprint, face recognition,
iris recognition, and retina scan.
Keystroke Authentication
Keystroke Pattern Detector
Keystroke dynamics has been used to strengthen password-based user authentication
systems by considering the typing characteristics of legitimate users.
Multifactor Authentication
Password
ID Card
When two or more authentication methods are used to authenticate someone, a
multifactor authentication system is being implemented.
Cryptography
Cryptography is a method of protecting information and communications through
the use of codes so that only those for whom the information is intended can read
and process it.
Encryption and Decryption
Plaintext Encryption Ciphertext
Ciphertext Decryption Plaintext
Plaintext
Encryption is a process which transforms the original information into an
unrecognizable form.
Decryption is a process of converting encoded/encrypted data in a form that is
readable and understood by a human or a computer.
Ciphers
Original Information Encrypted Information
Cipher
Cipher is a system of writing that prevents most people from understanding the message
Stream Cipher
Cipher Types
Plaintext Cipher Ciphertext
Stream ciphers create an arbitrarily long stream of key material, which is
combined with plain text bit-by-bit or character-by-character.
Block Cipher
Plaintext Ciphertext
Block Cipher Block
Block cipher takes a block of plain text and a key, and outputs a block of
ciphertext of the same size.
Steganography
Vessel Image Steganographic
Image
Steganographic techniques include:
• Hiding information in blocks.
Secret Data • Hiding information within images.
• Invisibly altering the structure of a digital image.
The art and science of hiding information by embedding messages within
other, seemingly harmless messages.
Types of Encryption
Encryption algorithms can be divided into three classes:
❑ Symmetric
❑ Asymmetric, and
❑ Hash function.
Symmetric and Asymmetric encryption can encrypt and decrypt data.
A Hash function can only encrypt data; that data cannot be decrypted
Hashing Encryption
Hashing is one way to enable security during the process of message
transmission when the message is intended for a particular recipient only.
Hashing Encryption Algorithms
❑MD5 – (Message Digest)
❑SHA – (Secure Hash Algorithms)
❑NTLM versions 1 and 2 – New Technology LAN Manager
❑RIPEMD - RACE Integrity Primitives Evaluation Message Digest
❑HMAC - Hash-based Message Authentication Code
Key
Original Information Cipher Encrypted
Information
= Two Letters
Following
An encryption key is a random string of bits created explicitly for scrambling
and unscrambling data.
Symmetric Encryption
Encrypts Data Decrypts Data
Same Key on Both Sides
Symmetric encryption uses a single key to encrypt and decrypt data. Therefore,
it is also referred to as secret-key, single-key, shared-key, and private-key
encryption.
Symmetric Encryption Algorithms
❑DES - Data Encryption Standard
❑3DES – Triple Data Encryption Standard
❑AES - Advanced Encryption Standard
❑Blowfish
❑Twofish
❑RC 4, 5, 6
Asymmetric Encryption
Public Key Encrypts Private Key Decrypts
Asymmetric encryption, also known as public key cryptography, uses two mathematically
related keys.
Asymmetric Encryption Techniques
❑RSA - Rivest–Shamir–Adleman
❑DH - Diffie–Hellman key exchange.
❑ECC - Elliptic curve cryptography
❑DHE - Diffie–Hellman key exchange
❑ECDHE - Elliptic curve Diffie-Hellman
Key Exchange
Sender Receiver
For messages to be exchanged, the sender and receiver need the right cryptographic keys
Symmetric cipher: Asymmetric cipher:
Same key Each other’s public key
Key exchange (also key establishment) is a method in cryptography by which
cryptographic keys are exchanged between two parties, allowing use of a
cryptographic algorithm.
Digital Signatures
Hash Value of
Hash Value Matches
Signature
DIGITAL SIGNATURE is a process that guarantees that the contents of a
message have not been altered in transit.
Session Keys
Single-Use Key
Related Sender Receiver
Messages
Unrelated message requires a different key
A SESSION KEY is an encryption and decryption key that is randomly
generated to ensure the security of a communications session between a
user and another computer or between two computers.
Key Stretching
Original Key Key Stretching Enhanced Key
Algorithm
Key stretching makes it harder to crack passwords and passphrases.
KEY STRETCHING is the practice of converting a password to a longer and more
random key for cryptographic purposes such as encryption.
SECURITY POLICY
FUNDAMENTALS
Security Policy
Individual Policy
Formal
Policy
Statement Resources to
Protect
Implementation
Measures
Security policy is a definition of what it means to be secure for a system,
organization or other entity.
Security Policy Components
Policy statement - Formal document outlining the ways in which an organization
intends to conduct its affairs and act in specific circumstances.
Standards - a level of quality or attainment.
Guidelines - a general rule, principle, or piece of advice.
Procedures - an established or official way of doing something.
Security Policy Components
All security policies should include a well-defined security vision for the
organization.
Enforcement – This section should clearly identify how the policy will be
enforced and how security breaches and/or misconduct will be handled.
User Access to Computer Resources – This section should identify the roles and
responsibilities of users accessing resources on the organization’s network.
Security Policy Components
Security Profiles – This section should include information that identifies how
security profiles will be applied uniformly across common devices
Sensitive data — This section addresses any information that is protected
against unwarranted disclosure.
Passwords – This section should state clearly the requirements imposed on
users for passwords.
Security Policy Components
E-Mail – This section includes how to handle attachments, through filtering,
personal use of the e-mail system, language restrictions, and archival
requirements
Internet – This section is about usage and what content filtering is in place.
Anti-Virus – This section identifies the frequency of updating the file definitions
as well as how removable media, e-mail attachments and other files are scanned.
Back-up and Recovery – A comprehensive back-up and recovery plan is included
here.
Security Policy Components
Intrusion Detection – This section discusses what if any Network Security
Intrusion Detection or Prevention System is used and how it is implemented.
Remote Access – This section should identify all the ways that the system can be
remotely accessed and what is in place to ensure that access is from only
authorized individuals
Information Security Auditing – How are all the security programs reviewed and
how frequently
Information Security Training – Training occurs in many different flavors. One of
the types of training required in an organization is Awareness Training
Common Security Policy Types
AUP – Acceptable User Policy - or fair use policy, is a set of rules
applied by the owner, creator or administrator of a network, website, or
service.
Privacy policy - is a statement or a legal document that discloses some
or all of the ways a party gathers, uses, discloses, and manages a
customer or client's data.
Audit policy defines account limits for a set of users of one or more
resources.
Common Security Policy Types
Extranet policy - this document describes the policy under which
third-party organizations connect to your networks for the purpose of
transacting business related to your company
Password policy is a set of rules designed to enhance computer
security by encouraging users to employ strong passwords and use
them properly.
Common Security Policy Types
Wireless standards policy - provides guidelines regarding wireless
access points and the management by ITS of 802.11X and related
wireless standards access.
Social media policy is a living document that provides guidelines for
your organization’s social media use.
Group Policy
Group Policy is a feature of the Microsoft Windows NT family of operating systems that controls
the working environment of user accounts and computer accounts.
Security Document Categories
System architecture - is the conceptual model that defines the structure,
behavior, and more views of a system
Change documentation should describe the requirements driving the
change in sufficient detail to allow approvers and other officials to make
an informed decision on the change request.
Log is an official record of events during the operation
Inventories is a complete list of items such as property, goods in stock,
or the contents of a building.
Change Management
A CHANGE MANAGEMENT system will record what changes are made.
Three Levels of Change Management
❑ Individual Change Management
❑ Organizational/Initiative Change Management
❑ Enterprise Change Management Capability
Documentation Handling Measures
Classification Retention and Storage Disposal and Destruction
Documentation Handling Measures
Classification
Classification is the action or process of classifying something according to
shared qualities or characteristics.
Documentation Handling Measures
Retention and Storage
Documentation Handling Measures
Disposal and Destruction
Every paper or electronic record has a specific amount of time that it needs
to be kept. This is called a retention period.
Once the retention period has ended, records are disposed
according to their value and content:
▪ Shred
▪ Recycle
▪ Delete
▪ Transfer
• CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide
Paperback – October 12, 2017 by Darril Gibson
• CompTIA Security+ SY0-501 Cert Guide (4th Edition) (Certification
Guide), David L. Prowse (2018)
• CompTIA Security+ Study Guide: Exam SY0-501 7th Edition by
Emmett Dulaney (Author), Chuck Easttom (Author)