Module 1
Introduction to Information
Security
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 1
Module Objectives
By the end of this module, you should be able to:
1.1 Define information security
1.2 Discuss the history of computer security and explain how it evolved into
information security
1.3 Define key terms and critical concepts of information security
1.4 Describe the information security roles of professionals within an
organization
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 2
Introduction
• Every organization, whether public or private and regardless of size, has
information it wants to protect.
• Organizations have a responsibility to all their stakeholders to protect that
information.
• Unfortunately, there aren’t enough security professionals to go around.
• If you’re not part of the solution, you’re part of the problem.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 3
The History of Information Security
• Computer security began immediately after the first mainframes were
developed.
− Groups developing code-breaking computations during World War II created
the first modern computers.
− Multiple levels of security were implemented to protect these devices.
• During these early years, information security was a straightforward process
composed predominantly of physical security and simple document
classification schemes.
• The primary threats to security were physical theft of equipment, espionage
against products of the systems, and sabotage.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 4
Key Dates in Information Security (1 of 3)
Date Document
1968 Maurice Wilkes discusses password security in Time-Sharing Computer Systems.
1970 Willis H. Ware authors the report "Security Controls for Computer Systems: Report of Defense
Science Board Task Force on Computer Security-RAND Report R-609," which was not declassified
until 1979. It became known as the seminal work identifying the need for computer security.
1973 Schell, Downey, and Popek examine the need for additional security in military systems in
Preliminary Notes on the Design of Secure Military Computer Systems.
1975 The Federal Information Processing Standards (FIPS) examines DES (Digital Encryption Standard)
in the Federal Register.
1978 Bisbey and Hollingworth publish their study “Protection Analysis: Final Report," which discussed the
Protection Analysis project created by ARPA to better understand the vulnerabilities of operating
system security and examine the possibility of automated vulnerability detection techniques in
existing system software.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 5
Key Dates in Information Security (2 of 3)
Date Document
1979 Morris and Thompson author “Password Security: A Case History," published in the Communications
of the Association for Computing Machinery (ACM). The paper examined the design history of a
password security scheme on a remotely accessed, time-sharing system.
Dennis Ritchie publishes “On the Security of UNIX" and "Protection of Data File Contents," which
discussed secure user IDs, secure group IDs, and the problems inherent in the systems.
1982 The U.S. Department of Defense Computer Security Evaluation Center publishes the first version of
the Trusted Computer Security (TCSEC) documents, which came to be known as the Rainbow
Series.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 6
Key Dates in Information Security (3 of 3)
Date Document
1984 Grampp and Morris write “The UNIX System: UNIX Operating System Security." In this report, the
authors examined four "important handles to computer security": physical control of premises and
computer facilities, management commitment to security objectives, education of employees, and
administrative procedures aimed at increased security.
Reeds and Weinberger publish “File Security and the UNIX System Crypt Command." Their premise
was: “No technique can be secure against wiretapping or its equivalent on the computer. Therefore,
no technique can be secure against the system administrator or other privileged users . . . the naive
user has no chance.“
1992 Researchers for the Internet Engineering Task Force, working at the Naval Research Laboratory,
develop the Simple Internet Protocol Plus (SIPP) Security protocols, creating what is now known as
IPSEC security.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 7
Computer Network Vulnerabilities
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 8
2000 to Present
• The Internet brings millions of unsecured computer networks and billions of
computer systems into continuous communication with each other.
• The ability to secure a computer’s data was influenced by the security of every
computer to which it is connected.
• The growing threat of cyberattacks has increased the awareness of need for
improved security.
• The threat environment has grown from the semiprofessional hacker defacing
Web sites for amusement to professional cybercriminals maximizing revenue
from theft and extortion, as well as government-sponsored cyberwarfare groups
striking military, government, and commercial targets.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 9
What Is Security?
• “A state of being secure and free from danger or harm; the actions taken to
make someone or something secure.”
• “The protection of information and its critical elements, including systems and
hardware that use, store, and transmit that information” (CNSS).
• InfoSec Includes information security management, data security, and network
security.
• C.I.A. triad of confidentiality, integrity, and availability:
− Is a standard based on confidentiality, integrity, and availability, now viewed
as inadequate.
− Expanded model consists of a list of critical characteristics of information
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 10
Knowledge Check
What is security?
a. Freedom from fear
b. Protection from loss
c. Keeping secrets
d. Being secure and free from danger
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 11
Components of Information Security
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 12
The C.I.A. Triad
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 13
Key Information Security Concepts
• Access • Protection profile or security posture
• Asset • Risk
• Attack • Subjects and objects
• Control, safeguard, or • Threat
countermeasure • Threat agent
• Exploit
• Threat event
• Exposure
• Threat source
• Loss
• Vulnerability
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 14
Key Concepts in Information Security
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 15
Critical Characteristics of Information
• The value of information comes from the characteristics it possesses:
− Confidentiality
− Integrity
− Availability
− Accuracy
− Authenticity
− Utility
− Possession
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 16
CNSS Security Model
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 17
Components of an Information System
• An information system (IS) is the entire set of hardware, software data, people,
procedures, and networks that enable a business to use information.
• All of them work together to support personal and professional operations.
• Each one has its own strengths and weaknesses, as well as its own
characteristics and uses.
• Each one has its own security requirements.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 18
Balancing Information Security and Access
• It is impossible to obtain perfect information security—it is a process, not a goal.
• Security should be considered a balance between protection and availability.
• To achieve balance, the level of security must allow reasonable access, yet
protect against threats.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 19
Approaches to Information Security
Implementation: Bottom-Up Approach
• Grassroots effort: systems administrators work to improve security of their
systems.
• Key advantage: technical expertise of individual administrators
• Seldom works, as it lacks a number of critical features:
− Participant support
− Organizational staying power
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 20
Approaches to Information Security
Implementation: Top-Down Approach
• Initiated by upper management
− Issue policy, procedures, and processes
− Dictate goals and expected outcomes of project
− Determine accountability for each required action
• The most successful type of top-down approach also involves a formal
development strategy referred to as a systems development life cycle.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 21
Approaches to Information Security
Implementation
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 22
Security Professionals and the Organization
• A wide range of professionals are required to support a diverse information
security program.
• Senior management support is the key component.
• Additional administrative support and technical expertise are required to
implement details of an IS program.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 23
Senior Management
• Chief information officer (CIO)
− Senior technology officer
− Primarily responsible for advising the senior executives on strategic planning
that affects the management of information in the organization
• Chief information security officer (CISO)
− Has primary responsibility for assessment, management, and
implementation of InfoSec in the organization
− Usually reports directly to the CIO
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 24
Knowledge Check
What title is given to the person with primary responsibility for assessment,
management, and implementation of InfoSec in the organization?
a. CIO
b. CISO
c. CEO
d. CFO
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 25
The CISO’s Place and Roles
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 26
Information Security Project Team
• A small functional team of people who are experienced in one or multiple facets
of required technical and nontechnical areas:
− Champion
− Team leader
− Security policy developers
− Risk assessment specialists
− Security professionals
− Systems administrators
− End users
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 27
Data Responsibilities
• Data owners: senior management responsible for the security and use of a
particular set of information
• Data custodian: responsible for information and systems that process, transmit,
and store it
• Data trustees: appointed by data owners to oversee the management of a
particular set of information and to coordinate with data custodians for its
storage, protection, and use
• Data users: have access to information and thus an information security role
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 28
Knowledge Check
Which group in the organization is appointed by data owners to oversee the
management of a particular set of information and to coordinate with data
custodians for its storage, protection, and use?
a. Data owners
b. Data custodian
c. Data trustee
d. Data user
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 29
Communities of Interest
• Group of individuals united by similar interests/values within an organization
− Information security management and professionals
− Information technology management and professionals
− Organizational management and professionals
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 30
Information Security: Is It an Art or a
Science?
• Implementation of information security is often described as a combination of art
and science.
• “Security artisan” idea: based on the way individuals perceive system
technologists and their abilities
• Security as art: no hard and fast rules nor many universally accepted complete
solutions; no manual for implementing security through entire system
• Security as science: technology is developed by scientists and engineers;
specific conditions cause virtually all actions in computer systems; almost every
security issue is a result of the interaction of specific hardware and software;
with sufficient time, developers could resolve all faults.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 31
Security as a Social Science
• Social science examines the behavior of individuals interacting with systems.
• Security begins and ends with the people that interact with the system,
intentionally or otherwise.
• Security administrators can greatly reduce the levels of risk caused by end
users and create more acceptable and supportable security profiles.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 32
Summary
• Information security evolved from the early field of computer security.
• Security is protection from danger. There are many types of security: physical
security, personal security, operations security, communications security,
national security, and network security, to name a few.
• Information security is the protection of information assets that use, store, or
transmit information through the application of policy, education, and technology.
• The critical characteristics of information, including confidentiality, integrity, and
availability (the C.I.A. triad), must be protected at all times. This protection is
implemented by multiple measures that include policies, education, training and
awareness, and technology.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 33
Summary
• Upper management drives the top-down approach to security implementation, in
contrast with the bottom-up approach or grassroots effort, in which individuals
choose security implementation strategies.
• Each organization has a culture in which communities of interest are united by
similar values and share common objectives. The three communities in
information security are general management, IT management, and information
security management.
• Information security has been described as both an art and a science, and it
comprises many aspects of social science as well.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 34
Self-Assessment
• What is information security?
− Confidentiality -Integrity -Availability -
Accuracy
− Authenticity -Utility -Possession
• How has the concept of security for the use of computer systems changed over
time?
• Information has many characteristics. What are the most critical of these
characteristics that need to be kept secure?
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 35