0% found this document useful (0 votes)
373 views65 pages

PPT Ch01

The document summarizes key points about presentations for chapters in an information security textbook. It lists the learning objectives covered in each chapter presentation and notes that the chapter objectives and some figures are included. It also mentions that a complete set of images can be found on the instructor companion site and that presentations can be customized for class needs.

Uploaded by

Charlito Mikolli
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
373 views65 pages

PPT Ch01

The document summarizes key points about presentations for chapters in an information security textbook. It lists the learning objectives covered in each chapter presentation and notes that the chapter objectives and some figures are included. It also mentions that a complete set of images can be found on the instructor companion site and that presentations can be customized for class needs.

Uploaded by

Charlito Mikolli
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 65

About the Presentations

• The presentations cover the objectives found in the


opening of each chapter.
• All chapter objectives are listed in the beginning of
each presentation.
• You may customize the presentations to fit your
class needs.
• Some figures from the chapters are included. A
complete set of images from the book can be found
on the Instructor Companion Site.

1
Principles of Information Security,
Fifth Edition

Chapter 1
Introduction to Information Security
Learning Objectives

• Upon completion of this material, you should be


able to:
– Define information security
– Recount the history of computer security and how it
evolved into information security
– Define key terms and critical concepts of information
security
– List the phases of the security systems development
life cycle
– Describe the information security roles of
professionals within an organization
Principles of Information Security, Fifth Edition 3
Introduction

• Information security: a “well-informed sense of


assurance that the information risks and controls
are in balance.”—Jim Anderson, Emagined
Security, Inc.
• Security professionals must review the origins of
this field to understand its impact on our
understanding of information security today.

Principles of Information Security, Fifth Edition 4


The History of Information Security

• Computer security began immediately after the first


mainframes were developed.
– Groups developing code-breaking computations
during World War II created the first modern
computers.
– Multiple levels of security were implemented.
• Physical controls limiting access to sensitive
military locations to authorized personnel
• Rudimentary in defending against physical theft,
espionage, and sabotage

Principles of Information Security, Fifth Edition 5


Principles of Information Security, Fifth Edition 6
Figure 1-1 – The Enigma

Principles of Information Security, Fifth Edition 7


The 1960s

• Advanced Research Project Agency (ARPA) began


to examine the feasibility of redundant networked
communications.
• Larry Roberts developed the ARPANET from its
inception.

Principles of Information Security, Fifth Edition 8


Figure 1-2 - ARPANET

Principles of Information Security, Fifth Edition 9


The 1970s and 80s

• ARPANET grew in popularity, as did its potential


for misuse.
• Fundamental problems with ARPANET security
were identified.
– No safety procedures for dial-up connections to
ARPANET
– Nonexistent user identification and authorization to
system

Principles of Information Security, Fifth Edition 10


The 1970s and 80s (cont’d)

• Information security began with Rand Report R-609


(paper that started the study of computer security
and identified the role of management and policy
issues in it).
• The scope of computer security grew from physical
security to include:
– Securing the data
– Limiting random and unauthorized access to data
– Involving personnel from multiple levels of the
organization in information security

Principles of Information Security, Fifth Edition 11


Principles of Information Security, Fifth Edition 12
MULTICS
• Early focus of computer security research centered on a
system called Multiplexed Information and Computing
Service (MULTICS).
• First operating system was created with security
integrated into core functions.
• Mainframe, time-sharing OS was developed in the mid-
1960s by General Electric (GE), Bell Labs, and
Massachusetts Institute of Technology (MIT).
• Several MULTICS key players created UNIX.
– Primary purpose of UNIX was text processing.
• Late 1970s: The microprocessor expanded computing
capabilities and security threats.
Principles of Information Security, Fifth Edition 13
The 1990s

• Networks of computers became more common, as


did the need to connect them to each other.
• Internet became the first global network of
networks.
• Initially, network connections were based on de
facto standards.
• In early Internet deployments, security was treated
as a low priority.
• In 1993, DEFCON conference was established for
those interested in information security.
Principles of Information Security, Fifth Edition 14
2000 to Present

• The Internet brings millions of unsecured computer


networks into continuous communication with each
other.
• The ability to secure a computer’s data was
influenced by the security of every computer to
which it is connected.
• Growing threat of cyber attacks has increased the
awareness of need for improved security.
– Nation-states engaging in information warfare

Principles of Information Security, Fifth Edition 15


What Is Security?
• “A state of being secure and free from danger or
harm; the actions taken to make someone or
something secure.”
• A successful organization should have multiple
layers of security in place to protect:
– Operations
– Physical infrastructure
– People
– Functions
– Communications
– Information
Principles of Information Security, Fifth Edition 16
What Is Security? (cont’d)

• The protection of information and its critical


elements, including systems and hardware that
use, store, and transmit that information
• Includes information security management, data
security, and network security
• C.I.A. triangle
– Is a standard based on confidentiality, integrity, and
availability, now viewed as inadequate.
– Expanded model consists of a list of critical
characteristics of information.

Principles of Information Security, Fifth Edition 17


Principles of Information Security, Fifth Edition 18
Key Information Security Concepts
• Access • Protection profile or
• Asset security posture
• Attack • Risk
• Control, safeguard, or
countermeasure
• Subjects and objects
• Exploit • Threat
• Exposure • Threat agent
• Loss • Vulnerability

Principles of Information Security, Fifth Edition 19


Principles of Information Security, Fifth Edition 20
Key Information Security Concepts
(cont’d)
• A computer can be the subject of an attack and/or
the object of an attack.
– When the subject of an attack, the computer is used
as an active tool to conduct attack.
– When the object of an attack, the computer is the
entity being attacked.

Principles of Information Security, Fifth Edition 21


Critical Characteristics of Information

• The value of information comes from the


characteristics it possesses:
– Availability
– Accuracy
– Authenticity
– Confidentiality
– Integrity
– Utility
– Possession

Principles of Information Security, Fifth Edition 22


CNSS Security Model

Principles of Information Security, Fifth Edition 23


Components of an Information System

• Information system (IS) is the entire set of people,


procedures, and technology that enable business
to use information.
– Software
– Hardware
– Data
– People
– Procedures
– Networks

Principles of Information Security, Fifth Edition 24


Balancing Information Security and
Access
• Impossible to obtain perfect information security—it
is a process, not a goal.
• Security should be considered a balance between
protection and availability.
• To achieve balance, the level of security must allow
reasonable access, yet protect against threats.

Principles of Information Security, Fifth Edition 25


Approaches to Information Security
Implementation: Bottom-Up Approach
• Grassroots effort: Systems administrators attempt
to improve security of their systems.
• Key advantage: technical expertise of individual
administrators
• Seldom works, as it lacks a number of critical
features:
– Participant support
– Organizational staying power

Principles of Information Security, Fifth Edition 26


Approaches to Information Security
Implementation: Top-Down Approach
• Initiated by upper management
– Issue policy, procedures, and processes
– Dictate goals and expected outcomes of project
– Determine accountability for each required action
• The most successful type of top-down approach
also involves a formal development strategy
referred to as systems development life cycle.

Principles of Information Security, Fifth Edition 27


Principles of Information Security, Fifth Edition 28
The Systems Development Life Cycle

• Systems development life cycle (SDLC): a


methodology for the design and implementation of
an information system
• Methodology: a formal approach to solving a
problem based on a structured sequence of
procedures
• Using a methodology:
– Ensures a rigorous process with a clearly defined
goal
– Increases probability of success
• Traditional SDLC consists of six general phases.
Principles of Information Security, Fifth Edition 29
Principles of Information Security, Fifth Edition 30
Investigation

• What problem is the system being developed to


solve?
• Objectives, constraints, and scope of project are
specified.
• Preliminary cost-benefit analysis is developed.
• At the end of all phases, a process is undertaken to
assess economic, technical, and behavioral
feasibilities and ensure implementation is worth the
time and effort.

Principles of Information Security, Fifth Edition 31


Analysis

• Consists of assessments of:


– The organization
– Current systems
– Capability to support proposed systems
• Analysts determine what new system is expected
to do and how it will interact with existing systems.
• Analysis ends with documentation of findings and
an update of feasibility.

Principles of Information Security, Fifth Edition 32


Logical Design

• The first and driving factor is the business need.


– Applications are selected to provide needed
services.
• Data support and structures capable of providing
the needed inputs are identified.
• Specific technologies are delineated to implement
the physical solution.
• Analysts generate estimates of costs and benefits
to allow comparison of available options.
• Feasibility analysis is performed at the end.
Principles of Information Security, Fifth Edition 33
Physical Design

• Specific technologies are selected to support the


alternatives identified and evaluated in the logical
design.
• Selected components are evaluated on make-or-
buy decision.
• Feasibility analysis is performed.
– Entire solution is presented to organization’s
management for approval.

Principles of Information Security, Fifth Edition 34


Implementation

• Needed software is created.


• Components are ordered, received, and tested.
• Users are trained and supporting documentation
created.
• Feasibility analysis is prepared.
– Sponsors are presented with the system for a
performance review and acceptance test.

Principles of Information Security, Fifth Edition 35


Maintenance and Change

• Longest and most expensive phase


• Consists of the tasks necessary to support and
modify the system for the remainder of its useful
life
• Life cycle continues until the team determines the
process should begin again from the investigation
phase.
• When current system can no longer support the
organization’s mission, a new project is
implemented.

Principles of Information Security, Fifth Edition 36


The Security Systems Development
Life Cycle (SecSDLC)
• The same phases used in traditional SDLC can be
adapted to support implementation of an IS project.
• It involves identifying specific threats and creating
specific controls to counter them.
• SecSDLC is a coherent program rather than a
series of random, seemingly unconnected actions.

Principles of Information Security, Fifth Edition 37


Investigation

• Identifies process, outcomes, goals, and


constraints of the project
• Begins with an enterprise information security
policy (EISP)
– Outlines implementation of a security program within
the organization
• Organizational feasibility analysis is performed.

Principles of Information Security, Fifth Edition 38


Analysis

• Documents from investigation phase are studied.


• Preliminary analysis of existing security policies or
programs, along with documented current threats
and associated controls
• Includes analysis of relevant legal issues that could
affect design of the security solution
• Risk management begins.

Principles of Information Security, Fifth Edition 39


Logical Design

• Creates and develops blueprints for information


security; examines and implements key policies
• Incident response actions planned:
– Continuity planning
– Incident response
– Disaster recovery
• Feasibility analysis to determine whether project
should be continued or outsourced

Principles of Information Security, Fifth Edition 40


Physical Design

• Evaluates information security technology needed


to support blueprint, as outlined in logical design
• Final physical design chosen.
• At end of phase, feasibility study determines
readiness of organization for project.
– Champion and sponsors presented with design for
approval

Principles of Information Security, Fifth Edition 41


Implementation

• Security solutions are acquired, tested,


implemented, and tested again.
• Personnel issues are evaluated; specific training
and education programs are conducted.
• Entire tested package is presented to upper
management for final approval.

Principles of Information Security, Fifth Edition 42


Maintenance and Change

• Perhaps the most important phase, given the ever-


changing threat environment.
• Often, repairing damage and restoring information
is a constant effort against an unseen adversary.
• Information security profile of an organization
requires constant adaptation as new threats
emerge and old threats evolve.

Principles of Information Security, Fifth Edition 43


Software Assurance—Security in the
SDLC
• Many organizations recognize the need to include
planning for security objectives in the SDLC used
to create systems.
– Established procedures to create software that is
more capable of being deployed in a secure fashion
• This approach is known as software assurance
(SA).
• Software Assurance Initiative resulted in the
publication of Secure Software Assurance (SwA)
Common Body of Knowledge (CBK).

Principles of Information Security, Fifth Edition 44


Software Assurance—Security in the
SDLC (cont’d)
• SwA CBK, which is a work in progress, contains the
following sections:
– Nature of Dangers
– Fundamental Concepts and Principles
– Ethics, Law, and Governance
– Secure Software Requirements
– Secure Software Design
– Secure Software Construction
– Secure Software Verification, Validation, and Evaluation
– Secure Software Tools and Methods
– Secure Software Processes
– Secure Software Project Management
– Acquisition of Secure Software
– Secure Software Sustainment
Principles of Information Security, Fifth Edition 45
Principles of Information Security, Fifth Edition 46
Software Design Principles

• Software development leaders J. H. Saltzer and


M. D. Schroeder first identified security principles:
– Economy of mechanism
– Fail-safe defaults
– Complete mediation
– Open design
– Separation of privilege
– Least privilege
– Least common mechanism
– Psychological acceptability
Principles of Information Security, Fifth Edition 47
The NIST Approach to Securing the
SDLC
• NIST Special Publication 800-64 rev. 2 maintains
that early integration of security in the SDLC
enables agencies to maximize return on investment
through:
– Early identification and mitigation of security
vulnerabilities and misconfigurations
– Awareness of potential engineering challenges
– Identification of shared security services and reuse
of security strategies and tools
– Facilitation of informed executive decision making

Principles of Information Security, Fifth Edition 48


The NIST Approach: Initiation

• Security at this point is looked at in terms of


business risks, with information security office
providing input.
• Key security activities include:
– Delineation of business requirements in terms of
confidentiality, integrity, and availability
– Determination of information categorization and
identification of known special handling requirements
to transmit, store, or create information
– Determination of any privacy requirements

Principles of Information Security, Fifth Edition 49


The NIST Approach:
Development/Acquisition
• Key security activities include:
– Conducting risk assessment and using results to
supplement baseline security controls
– Analyzing security requirements
– Performing functional and security testing
– Preparing initial documents for system certification
and accreditation
– Designing security architecture

Principles of Information Security, Fifth Edition 50


The NIST Approach:
Implementation/Assessment
• System is installed and evaluated in operational
environment.
• Key security activities include:
– Integrating information system into its environment
– Planning and conducting system certification
activities in synchronization with testing of security
controls
– Completing system accreditation activities

Principles of Information Security, Fifth Edition 51


The NIST Approach: Operations and
Maintenance
• Systems are in place and operating, enhancements
and/or modifications to the system are developed
and tested, and hardware and/or software are
added or replaced.
• Key security activities include:
– Conducting operational readiness review
– Managing configuration of system
– Instituting process and procedure for assured
operations and continuous monitoring of information
system’s security controls
– Performing reauthorization as required
Principles of Information Security, Fifth Edition 52
The NIST Approach: Disposal

• Provides for disposal of system and closeout of any


contracts in place
• Key security activities include:
– Building and executing disposal/transition plan
– Archival of critical information
– Sanitization of media
– Disposal of hardware and software

Principles of Information Security, Fifth Edition 53


Principles of Information Security, Fifth Edition 54
Security Professionals and the
Organization
• Wide range of professionals are required to support
a diverse information security program.
• Senior management is the key component.
• Additional administrative support and technical
expertise are required to implement details of IS
program.

Principles of Information Security, Fifth Edition 55


Senior Management

• Chief information officer (CIO)


– Senior technology officer
– Primarily responsible for advising the senior
executives on strategic planning
• Chief information security officer (CISO)
– Has primary responsibility for assessment,
management, and implementation of IS in the
organization
– Usually reports directly to the CIO

Principles of Information Security, Fifth Edition 56


Information Security Project Team

• A small functional team of people who are


experienced in one or multiple facets of required
technical and nontechnical areas:
– Champion
– Team leader
– Security policy developers
– Risk assessment specialists
– Security professionals
– Systems administrators
– End users

Principles of Information Security, Fifth Edition 57


Data Responsibilities

• Data owners: senior management responsible for


the security and use of a particular set of
information
• Data custodian: responsible for information and
systems that process, transmit, and store it
• Data users: individuals with an information security
role

Principles of Information Security, Fifth Edition 58


Communities of Interest

• Group of individuals united by similar


interests/values within an organization
– Information security management and professionals
– Information technology management and
professionals
– Organizational management and professionals

Principles of Information Security, Fifth Edition 59


Information Security: Is It an Art or a
Science?
• Implementation of information security is often
described as a combination of art and science.
• “Security artisan” idea: based on the way
individuals perceive system technologists and their
abilities

Principles of Information Security, Fifth Edition 60


Security as Art

• No hard and fast rules nor many universally


accepted complete solutions
• No manual for implementing security through entire
system

Principles of Information Security, Fifth Edition 61


Security as Science

• Dealing with technology designed for rigorous


performance levels
• Specific conditions cause virtually all actions in
computer systems.
• Almost every fault, security hole, and systems
malfunction is a result of interaction of specific
hardware and software.
• If developers had sufficient time, they could resolve
and eliminate faults.

Principles of Information Security, Fifth Edition 62


Security as a Social Science

• Social science examines the behavior of individuals


interacting with systems.
• Security begins and ends with the people that
interact with the system, intentionally or otherwise.
• Security administrators can greatly reduce the
levels of risk caused by end users and create
more acceptable and supportable security profiles.

Principles of Information Security, Fifth Edition 63


Summary

• Information security is a “well-informed sense of


assurance that the information risks and controls
are in balance.”
• Computer security began immediately after the first
mainframes were developed.
• Successful organizations have multiple layers of
security in place: physical, personal, operations,
communications, network, and information.

Principles of Information Security, Fifth Edition 64


Summary (cont’d)

• Security should be considered a balance between


protection and availability.
• Information security must be managed similar to
any major system implemented in an organization
using a methodology like SecSDLC.
• Implementation of information security is often
described as a combination of art and science.

Principles of Information Security, Fifth Edition 65

You might also like