Unit I
Unit I
Information Security (InfoSec) refers to the practice of protecting digital data, systems, and
networks from unauthorized access, misuse, disclosure, disruption, modification, or destruction.
It encompasses techniques, technologies, and strategies aimed at ensuring the confidentiality,
integrity, and availability (CIA triad) of valuable information and systems.
InfoSec covers various aspects, including physical security, technical measures, and
administrative controls to safeguard information assets from threats such as cyberattacks, data
breaches, and natural disasters.
What Are the Principles of Information Security?
The CIA triad is a widely recognized model that forms the foundation of information security.
These three principles are essential for ensuring the protection of sensitive data and the proper
functioning of information systems.
Confidentiality
This principle aims to protect sensitive information from unauthorized access and disclosure.
Confidentiality ensures that only authorized users can access the information, while others are
restricted. Techniques used to maintain confidentiality include encryption, password protection,
user authentication, access controls, and the implementation of strict privacy policies.
Integrity
The integrity principle ensures that information remains accurate, complete, and consistent
during its entire lifecycle. It prevents unauthorized users from modifying, tampering with, or
deleting data. Integrity also ensures that authorized users can only make modifications in an
approved manner. Measures for maintaining data integrity include checksums, digital signatures,
version control, and strict access controls.
Availability
This principle ensures that information and systems are accessible to authorized users when
needed. Availability is crucial for maintaining the functionality of information systems,
minimizing downtime, and ensuring that authorized users can access the data they require.
Strategies for maintaining availability include redundancy, backup systems, disaster recovery
planning, robust infrastructure, and network load balancing.
Together, the CIA triad forms a comprehensive framework that helps organizations develop
robust information security policies and procedures. It is essential for businesses to implement
measures that address each aspect of the triad to safeguard their data and maintain the trust of
stakeholders.
Information Security vs. Cybersecurity
Information security and cybersecurity are closely related fields that often overlap but have
distinct focuses and scopes.
InfoSec deals with the protection of information in various forms, including digital, physical,
and even verbal. It encompasses a wide range of measures, such as administrative, technical, and
physical controls, to safeguard data from unauthorized access, disclosure, disruption,
modification, or destruction. InfoSec addresses the security of data in storage, during processing,
and in transit.
Information security threats and attacks are actions or events that can compromise the
confidentiality, integrity, or availability of data and systems. They can originate from various
sources, such as individuals, groups, or even natural events. Here are some common information
security threats and attacks:
Network security
This type of security encompasses the protection of computer networks against unauthorized
access or misuse. Network security involves a range of technologies, such as firewalls, intrusion
detection/prevention systems, virtual private networks (VPNs), and secure protocols, to ensure
data confidentiality, integrity, and availability.
Application security
Application security involves securing software applications from cyber threats, such as
malware, SQL injection attacks, and cross-site scripting (XSS). Application security solutions
include secure coding practices, penetration testing, and vulnerability assessments.
Data security
Data security is the practice of protecting sensitive data from unauthorized access, use,
disclosure, or destruction. Data security involves a range of technologies, such as encryption,
access control, and backup and restore procedures, to ensure data confidentiality, integrity, and
availability.
Endpoint security
Endpoint security focuses on protecting endpoints, such as laptops, desktops, servers, and mobile
devices, from cyber threats. Traditional endpoint security technologies include antivirus and anti-
malware software and firewalls. Modern endpoint security includes advanced solutions like
endpoint detection and response (EDR) that can protect against zero-day threats.
Mobile security
Mobile security refers to the protection of mobile devices, applications, and data from
unauthorized access or exploitation. Mobile security solutions include mobile device
management (MDM) software, secure mobile application development, and secure
communication protocols.
Cloud security
Cloud security involves the protection of cloud-based data, applications, and infrastructure. It
covers a variety of security concerns, including data privacy, access control, threat management,
and compliance.
IoT security
IoT security involves securing the networks, devices, and data associated with the Internet of
Things (IoT). IoT security covers a range of security issues, including data privacy, access
control, device authentication, and network security.
What Is an Information Security Policy?
An information security policy is a formal, documented set of rules and guidelines that an
organization establishes to protect its information assets and ensure the confidentiality, integrity,
and availability of its data.
This policy serves as a framework for managing risk, defining acceptable behaviors, and setting
security expectations for employees, contractors, partners, and other stakeholders. It also helps
organizations comply with legal, regulatory, and industry requirements.
Purpose: A clear statement outlining the policy's objectives and the organization's
commitment to information security.
Scope: A description of the systems, data, and personnel covered by the policy, including
any third-party vendors or partners.
Roles and responsibilities: A definition of the roles and responsibilities of various
stakeholders, such as management, IT staff, and employees, in implementing,
maintaining, and enforcing the policy.
Asset management: Guidelines for identifying, classifying, and managing the
organization's information assets to ensure appropriate protection levels.
Access control: Rules for granting and revoking access to systems and data, including
user authentication, authorization, and password management.
Incident response: Procedures for detecting, reporting, and responding to security
incidents, including communication protocols and escalation paths.
Physical security: Measures to protect the organization's facilities, equipment, and
information assets from unauthorized access, theft, or damage.
Training and awareness: Requirements for regular employee training and awareness
programs to promote a culture of security and ensure that personnel understand their
responsibilities.
Monitoring and auditing: Processes for monitoring compliance with the policy,
including regular audits, assessments, and reviews to identify gaps and areas for
improvement.
Policy review and updates: A schedule for periodically reviewing and updating the
policy to ensure it remains relevant, effective, and aligned with the organization's
evolving needs and the changing threat landscape.
An information security policy is a critical component of an organization's overall security
strategy, as it provides a foundation for implementing technical measures, administrative
controls, and best practices to safeguard its information assets.
Notable Information Security Solutions and Technologies
It is not possible to list the thousands of security tools and technologies used by modern security
organizations. However, here are some of the most common tools that are typically present in a
mature security stack.
Firewalls
A firewall is a network security device that monitors incoming and outgoing traffic, acting as a
barrier between a trusted internal network and untrusted external networks. Firewalls use
predefined rules to allow or block traffic based on factors like IP addresses, ports, and protocols,
preventing unauthorized access and malicious traffic from entering the network.
IDS is a security technology that monitors network traffic for signs of malicious activity or
policy violations. If detected, it generates alerts for security personnel to investigate. IPS, on the
other hand, is an active system that not only detects but also blocks or prevents malicious traffic
in real-time. Both IDS and IPS can be host-based (focusing on a single system) or network-based
(monitoring the entire network).
Security Incident and Event Management (SIEM)
SIEM solutions collect, aggregate, and analyze log data from various sources, such as firewalls,
IDS/IPS, servers, and applications. They help organizations detect, investigate, and respond to
security incidents by providing real-time monitoring, advanced analytics, and automated
response capabilities. SIEM solutions also enable compliance with regulatory requirements
through centralized reporting and auditing.
Vulnerability Management
Once vulnerabilities are identified, organizations prioritize and remediate them through patching,
configuration changes, or other security controls. The main goal of vulnerability management is
to reduce the likelihood and impact of successful cyberattacks by minimizing exploitable
vulnerabilities in the environment.
Attack surface management is the practice of identifying, mapping, and reducing the potential
entry points (attack vectors) an adversary could use to compromise an organization's IT systems
and data. This involves understanding and securing all components of the IT environment,
including hardware, software, networks, cloud services, and third-party integrations.
By minimizing the attack surface, organizations can reduce the risk of cyberattacks, lower the
chances of successful breaches, and improve their overall security posture. Attack surface
management includes activities such as continuous monitoring, threat modeling, secure
configuration management, and proper access control implementation.
Cloud Security Posture Management (CSPM)
CSPM solutions help organizations maintain and improve their security posture in cloud
environments by continuously monitoring cloud infrastructure, identifying misconfigurations,
and providing recommendations for remediation. CSPM tools enable organizations to enforce
security policies, assess compliance, and mitigate risks associated with cloud adoption.
Threat Intelligence
Threat intelligence refers to the collection, analysis, and sharing of information about existing
and emerging threats, such as threat actors, tactics, techniques, and procedures (TTPs),
vulnerabilities, and indicators of compromise (IoCs). Threat intelligence solutions help
organizations proactively identify and mitigate risks, prioritize security efforts, and improve their
overall security posture.
What Is Information Security Risk Management?
Information Security Risk Management is the process of identifying, assessing, prioritizing, and
mitigating risks associated with an organization's information assets and IT infrastructure. The
goal of information security risk management is to protect the confidentiality, integrity, and
availability of information assets while minimizing the impact of security incidents on the
organization's operations, reputation, and legal obligations.
An incident response plan prepares an organization to effectively manage and respond to security
incidents, minimizing the potential impact and ensuring a swift return to normal operations.
By establishing clear roles and responsibilities, outlining response procedures, and promoting
continuous improvement, an incident response plan helps organizations maintain a strong
security posture and protect their critical assets.
Adopt DevSecOps
DevSecOps, which stands for Development, Security, and Operations, integrates security
practices throughout the software development lifecycle. By incorporating security as an integral
part of the development process, DevSecOps aims to reduce vulnerabilities, ensure faster
response to security incidents, and promote a culture of shared responsibility for security across
the entire organization.
Red team-blue team exercises involve two groups working together to strengthen an
organization's security posture. The red team simulates real-world attacks, while the blue team
defends against these attacks, detects intrusions, and mitigates threats.
By engaging in these exercises, organizations can strengthen their security posture, improve
incident response capabilities, and foster a culture of shared responsibility for security.
Data encryption protects sensitive data from unauthorized access and ensures the confidentiality
and integrity of that data, both in transit and at rest.
By implementing strong encryption measures, organizations can minimize the risk of data
breaches, build trust with stakeholders, and maintain a robust security posture.
Leverage Strong Authentication
Information Assurance:
Businesses that store and exchange critical data over information networks need to be mindful
of how vulnerable each individual machine can be. Whether you’re supporting existing
systems or designing and implementing new ones, your organization should aim to reduce the
exposure to and impact of cyber risk by working within the frameworks of compliance,
industry regulations, risk management and organizational policies, aka information assurance.
As network security issues become more prevalent, information assurance (IA) has grown to
be a nuanced and essential part of information security. However, implementing sound
information assurance management is difficult.
Adding to the challenge is a variety of confusing terms and misnomers. Even seasoned IT pros
can get confused between information assurance, cyber assurance, cybersecurity and
information security. Often, these terms are used interchangeably, leading to IA bad practices.
Information assurance (IA) is the practice of assuring information and managing risks related
to the use, processing, storage and transmission of information. Information assurance
includes protection of the integrity, availability, authenticity, non-repudiation and
confidentiality of user data.
Undetected loopholes in the network can lead to unauthorized access, editing, copying or
deleting of valuable information. This is where information assurance plays a key role.
Information assurance predates the internet, and even though cybersecurity falls under the
umbrella of IA, both play different roles in network security.
Focus
IA focuses on risk management and comes up with guidelines for keeping information secure,
whether on physical (hard drives, PCs, laptops and tablets) or digital (cloud) systems.
Cybersecurity focuses on setting up resilient network architecture to secure digital assets from
unwarranted access.
Scope
IA is concerned with the business aspect of information. As a result, the scope is broader.
Cybersecurity deals in the nitty-gritty to protect everything. As a result, the scope is more
detailed.
Approach
IA is strategic, dealing with policy creation and deployment to keep information assets secure.
It understands how an organization engages with information, the value of the information and
how exposed that information happens to be. Cybersecurity is technical, dealing with security
controls and tools to defend against cyberattacks.
Resources protected
IA protects data and information systems and includes both physical and digital data.
Cybersecurity protects all digital investments, which include information, infrastructures,
networks and applications.
The NIST defines information security as the process of protection of information and
information systems from unauthorized access, use, disclosure, disruption, modification or
destruction in order to provide confidentiality, integrity and availability.
The differences between information assurance and information security are more than just
semantics.
Focus
Approach
IA is not concerned with the specific technology or tools used to protect information. Rather, it
is centered around developing policies and standards. Information security directly deals with
tools and technologies used to protect information. It’s a hands-on approach that safeguards
data from cyberthreats.
Scope
IA stresses organizational risk management and overall information quality. As a result, IA has
a broad scope. Information security stresses risk control and agreement. As a result,
information security has a detailed scope.
What is the goal of information assurance?
The purpose of IA is to reduce information risks by ensuring the information on which the
business makes decisions is reliable. This purpose is achieved by following:
Risk management: Businesses face legal fines and penalties if the information in the
network is compromised. IA enables risk assessment to identify vulnerabilities and the
potential impact on the business in terms of compliance, cost and operational continuity.
The goal is to mitigate potential threats.
Encryption at rest and in transit: IA mandates end-to-end encryption to protect privacy
by ensuring no human or computer can read data at rest and in transit except the intended
parties. The goal is to help businesses stay compliant with regulatory requirements and
standards.
Data integrity: Bad business decisions usually stem from bad data. IA focuses on
auditing data collection and tracking process, improving transparency in the
organizational process. The goal is to manage data in a way that a future audit can retrace
the process, leading to better decision-making.
Operational benefits:
Resilient business processes
Improved customer service
Better information usage
Improved responsiveness
Tactical benefits:
Easy compliance
Better understanding of business opportunities
Commitment from business partners and customers
Strategic benefits:
Better governance
Cheaper equity
More sales
Lower costs
Organizational benefits:
Improved shareholder value
Gain competitive advantage
License to operate
Information assurance is a strategic endeavor that extends beyond simply IT. The reality is that
the legal and reputational ramifications that ensue from a data breach affect the entire
organization. A proper security framework helps protect your organization and customers. IA
is a work in progress that includes:
The CIA triad is considered the first model of information assurance introduced to define
effective practices of assuring information security and integrity. Here are the following five
pillars of IA that make information networks safe against all threats:
Integrity
Information sent should always remain in its original state. Integrity means tampering or
modification by bad actors should not occur. Therefore, the primary goal of this pillar is to set
up safeguards to deter threats.
Availability
Easy data access helps users seamlessly access important information to perform critical tasks.
Availability means those who need access to information can do so. Therefore, the primary
goal of this pillar is to ensure systems always remain fully functional.
Authenticity
Verify the identity of a user (device) before allowing them to access data with methods like
two-factor authentication, password management, biometrics and other devices. Authenticity
means ensuring that those who have access to information are who they say they are. The
primary goal of this pillar is to prevent identity theft.
Confidentiality
Protect private information from getting exposed by any unauthorized users, systems or
networks. Confidentiality means data should be accessed only by those who have proper
authorization. Therefore, the primary goal of this pillar is to avoid IP theft or the compromise
of Personal Identifiable Information (PII) of customers.
Non-repudiation
It is important that the information system is able to provide proof of delivery to confirm that
the data was properly transmitted. Non-repudiation means someone with access to your
organization’s information system cannot deny having completed an action within the system,
as there should be methods in place to prove that they did make said action. The primary goal
of this pillar is to guarantee that the digital signature is that of the intended party, thereby
granting authorization to the protected information.
Viruses—a piece of code injects itself into an application. When the application runs, the
malicious code executes.
Worms—malware that exploits software vulnerabilities and backdoors to gain access to an
operating system. Once installed in the network, the worm can carry out attacks such as
distributed denial of service (DDoS).
Trojans—malicious code or software that poses as an innocent program, hiding in apps, games
or email attachments. An unsuspecting user downloads the trojan, allowing it to gain control of
their device.
Ransomware—a user or organization is denied access to their own systems or data via
encryption. The attacker typically demands a ransom be paid in exchange for a decryption key to
restore access, but there is no guarantee that paying the ransom will actually restore full access or
functionality.
Cryptojacking—attackers deploy software on a victim’s device, and begin using their
computing resources to generate cryptocurrency, without their knowledge. Affected systems can
become slow and cryptojacking kits can affect system stability.
Spyware—a malicious actor gains access to an unsuspecting user’s data, including sensitive
information such as passwords and payment details. Spyware can affect desktop browsers,
mobile phones and desktop applications.
Adware—a user’s browsing activity is tracked to determine behavior patterns and interests,
allowing advertisers to send the user targeted advertising. Adware is related to spyware but does
not involve installing software on the user’s device and is not necessarily used for malicious
purposes, but it can be used without the user’s consent and compromise their privacy.
Fileless malware—no software is installed on the operating system. Native files like WMI and
PowerShell are edited to enable malicious functions. This stealthy form of attack is difficult to
detect (antivirus can’t identify it), because the compromised files are recognized as legitimate.
Rootkits—software is injected into applications, firmware, operating system kernels or
hypervisors, providing remote administrative access to a computer. The attacker can start the
operating system within a compromised environment, gain complete control of the computer and
deliver additional malware.
Social Engineering Attacks
Social engineering involves tricking users into providing an entry point for malware. The victim
provides sensitive information or unwittingly installs malware on their device, because the
attacker poses as a legitimate actor.
Here are some of the main types of social engineering attacks:
Baiting—the attacker lures a user into a social engineering trap, usually with a promise of
something attractive like a free gift card. The victim provides sensitive information such as
credentials to the attacker.
Pretexting—similar to baiting, the attacker pressures the target into giving up information under
false pretenses. This typically involves impersonating someone with authority, for example an
IRS or police officer, whose position will compel the victim to comply.
Phishing—the attacker sends emails pretending to come from a trusted source. Phishing often
involves sending fraudulent emails to as many users as possible, but can also be more targeted.
For example, “spear phishing” personalizes the email to target a specific user, while “whaling”
takes this a step further by targeting high-value individuals such as CEOs.
Vishing (voice phishing)—the imposter uses the phone to trick the target into disclosing
sensitive data or grant access to the target system. Vishing typically targets older individuals but
can be employed against anyone.
Smishing (SMS phishing)—the attacker uses text messages as the means of deceiving the
victim.
Piggybacking—an authorized user provides physical access to another individual who
“piggybacks” off the user’s credentials. For example, an employee may grant access to someone
posing as a new employee who misplaced their credential card.
Tailgating—an unauthorized individual follows an authorized user into a location, for example
by quickly slipping in through a protected door after the authorized user has opened it. This
technique is similar to piggybacking except that the person being tailgated is unaware that they
are being used by another individual.
Supply Chain Attacks
Supply chain attacks are a new type of threat to software developers and vendors. Its purpose is
to infect legitimate applications and distribute malware via source code, build processes or
software update mechanisms.
Attackers are looking for non-secure network protocols, server infrastructure, and coding
techniques, and use them to compromise build and update process, modify source code and hide
malicious content.
Supply chain attacks are especially severe because the applications being compromised
by attackers are signed and certified by trusted vendors. In a software supply chain attack, the
software vendor is not aware that its applications or updates are infected with malware.
Malicious code runs with the same trust and privileges as the compromised application.
Types of supply chain attacks include:
HTTP flood DDoS—the attacker uses HTTP requests that appear legitimate to overwhelm an
application or web server. This technique does not require high bandwidth or malformed packets,
and typically tries to force a target system to allocate as many resources as possible for each
request.
SYN flood DDoS—initiating a Transmission Control Protocol (TCP) connection sequence
involves sending a SYN request that the host must respond to with a SYN-ACK that
acknowledges the request, and then the requester must respond with an ACK. Attackers can
exploit this sequence, tying up server resources, by sending SYN requests but not responding to
the SYN-ACKs from the host.
UDP flood DDoS—a remote host is flooded with User Datagram Protocol (UDP) packets sent to
random ports. This technique forces the host to search for applications on the affected ports and
respond with “Destination Unreachable” packets, which uses up the host resources.
ICMP flood—a barrage of ICMP Echo Request packets overwhelms the target, consuming both
inbound and outgoing bandwidth. The servers may try to respond to each request with an ICMP
Echo Reply packet, but cannot keep up with the rate of requests, so the system slows down.
NTP amplification—Network Time Protocol (NTP) servers are accessible to the public and can
be exploited by an attacker to send large volumes of UDP traffic to a targeted server. This is
considered an amplification attack due to the query-to-response ratio of 1:20 to 1:200, which
allows an attacker to exploit open NTP servers to execute high-volume, high-bandwidth DDoS
attacks.
Injection Attacks
Injection attacks exploit a variety of vulnerabilities to directly insert malicious input into the
code of a web application. Successful attacks may expose sensitive information, execute a DoS
attack or compromise the entire system.
Here are some of the main vectors for injection attacks:
SQL injection—an attacker enters an SQL query into an end user input channel, such as a web
form or comment field. A vulnerable application will send the attacker’s data to the database,
and will execute any SQL commands that have been injected into the query. Most web
applications use databases based on Structured Query Language (SQL), making them vulnerable
to SQL injection. A new variant on this attack is NoSQL attacks, targeted against databases that
do not use a relational data structure.
Code injection—an attacker can inject code into an application if it is vulnerable. The web
server executes the malicious code as if it were part of the application.
OS command injection—an attacker can exploit a command injection vulnerability to input
commands for the operating system to execute. This allows the attack to exfiltrate OS data or
take over the system.
LDAP injection—an attacker inputs characters to alter Lightweight Directory Access Protocol
(LDAP) queries. A system is vulnerable if it uses unsanitized LDAP queries. These attacks are
very severe because LDAP servers may store user accounts and credentials for an entire
organization.
XML eXternal Entities (XXE) Injection—an attack is carried out using specially-constructed
XML documents. This differs from other attack vectors because it exploits inherent
vulnerabilities in legacy XML parsers rather than unvalidated user inputs. XML documents can
be used to traverse paths, execute code remotely and execute server-side request forgery (SSRF).
Cross-Site Scripting (XSS)—an attacker inputs a string of text containing malicious JavaScript.
The target’s browser executes the code, enabling the attacker to redirect users to a malicious
website or steal session cookies to hijack a user’s session. An application is vulnerable to XSS if
it doesn’t sanitize user inputs to remove JavaScript code.