Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

1/28/2021

Learning Objectives:
Introduction to Information
Upon completion of this chapter you should be able to:
Security • Understand what information security is and how it came to mean
what it does today.
Chapter 1 • Comprehend the history of computer security and how it evolved into
information security.
Do not figure on opponents not attacking; worry about your own lack of • Understand the key terms and critical concepts of information security
preparation. as presented in the chapter.
-- Book of the Five Rings • Outline the phases of the security systems development life cycle.
• Understand the role professionals involved in information security in
an organizational structure.

Principles of Information Security - Chapter 1 Slide 2

What Is Information Security? The History Of Information Security


• Computer security began immediately after the
first mainframes were developed
• Groups developing code-breaking computations
during World War II created the first modern
computers
• Physical controls were needed to limit access to
authorized personnel to sensitive military locations
Information security in today’s enterprise is a • Only rudimentary controls were available to
“well-informed sense of assurance that the defend against physical theft, espionage, and
information risks and controls are in balance.” – sabotage
Jim Anderson, Inovant (2002)
Principles of Information Security - Chapter 1 Slide 3 Principles of Information Security - Chapter 1 Slide 4

Figure 1-1 – The Enigma The 1960s


• Department of Defense’s
Advanced Research Project
Agency (ARPA) began
examining the feasibility of a
redundant networked
communications

• Larry Roberts developed the project


from its inception

Principles of Information Security - Chapter 1 Slide 5 Principles of Information Security - Chapter 1 Slide 6

1
1/28/2021

Figure 1-2 - ARPANET The 1970s and 80s


• ARPANET grew in popularity as did its
potential for misuse
• Fundamental problems with ARPANET
security were identified
• No safety procedures for dial-up connections
to the ARPANET
• User identification and authorization to the
system were non-existent
• In the late 1970s the microprocessor
expanded computing capabilities and
security threats

Principles of Information Security - Chapter 1 Slide 7 Principles of Information Security - Chapter 1 Slide 8

R-609 – The Start of the


Study of Computer Security

• Information Security began with Rand


Report R-609
• The scope of computer security grew from
physical security to include:
• Safety of the data
• Limiting unauthorized access to that data
• Involvement of personnel from multiple levels
of the organization

Principles of Information Security - Chapter 1 Slide 9 Principles of Information Security - Chapter 1 Slide 10

The 1990s The Present


• Networks of computers became more • The Internet has brought millions of
common, so too did the need to computer networks into
interconnect the networks communication with each other –
• Resulted in the Internet, the first many of them unsecured
manifestation of a global network of • Ability to secure each now influenced
networks by the security on every computer to
• In early Internet deployments, security which it is connected
was treated as a low priority

Principles of Information Security - Chapter 1 Slide 11 Principles of Information Security - Chapter 1 Slide 12

2
1/28/2021

What Is Security? What Is Information Security?


• “The quality or state of being secure--to be • The protection of information and its
free from danger” critical elements, including the systems
• To be protected from adversaries and hardware that use, store, and transmit
that information
• A successful organization should have
multiple layers of security in place: • Tools, such as policy, awareness, training,
• Physical security education, and technology are necessary
• Personal security • The C.I.A. triangle was the standard based
• Operations security on confidentiality, integrity, and
• Communications security availability The CIA Triad
• Network security • The C.I.A. triangle has expanded into a list
Principles of Information Security - Chapter 1 Slide 13
of critical characteristics of information
Principles of Information Security - Chapter 1 Slide 14

Critical Characteristics
Of Information Figure 1-3 – NSTISSC Security Model
The value of information comes Accuracy

from the characteristics it


possesses.
• Availability
• Accuracy
• Authenticity
• Confidentiality
• Integrity
• Utility Possession
• Possession
Principles of Information Security - Chapter 1 Slide 15 Principles of Information Security - Chapter 1 Slide 16

Components of an
Information System Securing the Components
• The computer can be either or both
the subject of an attack and/or the
object of an attack
• When a computer is
• To fully understand the importance of information security, you need • the subject of an attack, it is used as
to know the elements of an information system an active tool to conduct the attack
• the object of an attack, it is the entity
• An Information System (IS) is much more than computer hardware; it is being attacked
the entire set of software, hardware, data, people, and procedures
necessary to use information as a resource in the organization
Principles of Information Security - Chapter 1 Slide 17 Principles of Information Security - Chapter 1 Slide 18

3
1/28/2021

Balancing Security and Access


Figure 1-5 – Subject and Object of Attack
• It is impossible to obtain perfect security - it is not an
absolute; it is a process
• Security should be considered a balance between
protection and availability
• To achieve balance, the level of security must allow
reasonable access, yet protect against threats

Principles of Information Security - Chapter 1 Slide 19 Principles of Information Security - Chapter 1 Slide 20

Figure 1-6 – Balancing Security and Access Bottom Up Approach


• Security from a grass-roots effort -
systems administrators attempt to
improve the security of their systems
• Key advantage - technical expertise of
the individual administrators
• Seldom works, as it lacks a number of
critical features:
• participant support
• organizational staying power
Principles of Information Security - Chapter 1 Slide 21 Principles of Information Security - Chapter 1 Slide 22

Figure 1-7 – Approaches to Security


Top-down Approach
Implementation
• Initiated by upper management:
• issue policy, procedures, and processes
• dictate the goals and expected outcomes of the project
• determine who is accountable for each of the required actions
• This approach has strong upper management support, a dedicated
champion, dedicated funding, clear planning, and the chance to
influence organizational culture
• May also involve a formal development strategy referred to as a
systems development life cycle
• Most successful top-down approach

Principles of Information Security - Chapter 1 Slide 23 Principles of Information Security - Chapter 1 Slide 24

4
1/28/2021

Figure 1-8 – SDLC Waterfall Methodology


The Systems • Information security must be managed
in a manner similar to any other major
Development system implemented in the organization
Life Cycle • Using a methodology
• ensures a rigorous process
• avoids missing steps
• The goal is creating a comprehensive
security posture/program

Principles of Information Security - Chapter 1 Slide 25 Principles of Information Security - Chapter 1 Slide 26

SDLC and the SecSDLC Investigation


• The SecSDLC may be • What is the problem the system is
• event-driven - started in being developed to solve?
response to some occurrence
or • The objectives, constraints, and
• plan-driven - as a result of a scope of the project are specified
carefully developed • A preliminary cost/benefit analysis is
implementation strategy developed
• At the end of each phase • A feasibility analysis is performed to This Photo by Unknown Author is licensed under CC BY-SA

comes a structured review assesses the economic, technical,


and behavioral feasibilities of the
process
Principles of Information Security - Chapter 1 Slide 27 Principles of Information Security - Chapter 1 Slide 28

Analysis Logical Design


• Consists primarily of • Based on business need, applications
• assessments of the organization are selected capable of providing
• the status of current systems needed services
• capability to support the proposed systems • Based on applications needed, data
• Analysts begin to determine support and structures capable of
• what the new system is expected to do
providing the needed inputs are
• how the new system will interact with existing
This Photo by Unknown
Author is licensed This Photo by Unknown Author is licensed under
CC BY-SA
identified
under CC BY-ND

systems • Finally, based on all of the above, select


• Ends with the documentation of the specific ways to implement the physical
solution are chosen
findings and a feasibility analysis
update • At the end, another feasibility analysis is
performed
Principles of Information Security - Chapter 1 Slide 29 Principles of Information Security - Chapter 1 Slide 30

5
1/28/2021

Physical Design Implementation


Which of the three will you
choose? Why? • Components are ordered, received, assembled,
and tested
• Users are trained and documentation created
• Specific technologies are selected to support the • Users are then presented with the system for a
alternatives identified and evaluated in the logical design performance review and acceptance test
• Selected components are evaluated based on a make-or-
buy decision
• Entire solution is presented to the end-user representatives
This Photo by Unknown Author is licensed under CC BY-SA-NC

for approval
Principles of Information Security - Chapter 1 Slide 31 Principles of Information Security - Chapter 1 Slide 32

Security Systems
Maintenance and Change Development Life Cycle
• Tasks necessary to support and • The same phases used in the traditional
modify the system for the SDLC adapted to support the specialized
remainder of its useful life implementation of a security project
• The life cycle continues until the
process begins again from the • Basic process is identification of threats and
investigation phase controls to counter them
• When the current system can no • The SecSDLC is a coherent program rather
longer support the mission of than a series of random, seemingly
the organization, a new project unconnected actions
is implemented
Principles of Information Security - Chapter 1 Slide 33 Principles of Information Security - Chapter 1 Slide 34

Investigation Analysis
• Identifies process, outcomes and goals of the • Analysis of existing security policies or
project, and constraints programs, along with documented
• Begins with a statement of program security policy current threats and associated
controls
• Teams are organized, problems analyzed, and scope
defined, including objectives, and constraints not • Includes an analysis of relevant legal
covered in the program policy issues that could impact the design of
the security solution
• An organizational feasibility analysis is performed
• The risk management task (identifying,
assessing, and evaluating the levels of
This Photo by Unknown Author is licensed under CC BY-SA-NC

risk) also begins


Principles of Information Security - Chapter 1 Slide 35 Principles of Information Security - Chapter 1 Slide 36

6
1/28/2021

Logical & Physical Design


• Creates blueprints for security
• Critical planning and feasibility analyses to
determine whether or not the project
should continue
• In physical design, security technology is
evaluated, alternatives generated, and final
design selected
• At end of phase, feasibility study determines
readiness so all parties involved have a
chance to approve the project
Principles of Information Security - Chapter 1 Slide 37 Principles of Information Security - Chapter 1 Slide 38

Implementation Maintenance and Change


• The security solutions are acquired (made or • The maintenance and change phase is perhaps
bought), tested, and implemented, and tested most important, given the high level of ingenuity in
again today’s threats
• Personnel issues are evaluated and specific • The reparation and restoration of information is a
training and education programs conducted constant duel with an often unseen adversary
• Finally, the entire tested package is presented • As new threats emerge and old threats evolve, the
to upper management for final approval information security profile of an organization
requires constant adaptation

Principles of Information Security - Chapter 1 Slide 39 Principles of Information Security - Chapter 1 Slide 40

Security Professionals and Senior Management


the Organization
• Chief Information Officer
• It takes a wide range of professionals to support • the senior technology officer
a diverse information security program • primarily responsible for advising the senior executive(s)
for strategic planning
• To develop and execute specific security • Chief Information Security Officer
policies and procedures, additional • responsible for the assessment, management, and
administrative support and technical expertise implementation of securing the information in the
is required organization
• may also be referred to as the Manager for Security, the
Security Administrator, or a similar title

Principles of Information Security - Chapter 1 Slide 41 Principles of Information Security - Chapter 1 Slide 42

7
1/28/2021

Security Project Team Data Ownership


A number of individuals who are experienced in • Data Owner - responsible for the security
one or multiple requirements of both the and use of a particular set of information
technical and non-technical areas: • Data Custodian - responsible for the
• The champion storage, maintenance, and protection of
the information
• The team leader
• Data Users - the end systems users who
• Security policy developers work with the information to perform
• Risk assessment specialists their daily jobs supporting the mission of
• Security professionals the organization
• Systems administrators This Photo by Unknown Author is licensed under CC BY-NC
This Photo by Unknown Author is licensed under CC BY-NC-ND

• End users
Principles of Information Security - Chapter 1 Slide 43 Principles of Information Security - Chapter 1 Slide 44

Information Security:
Communities Of Interest Is It an Art or a Science?
• Each organization develops and • With the level of
maintains its own unique culture and complexity in
values. Within that corporate culture, today’s information
there are communities of interest: systems, the
• Information Security Management and implementation of
Professionals
information
• Information Technology Management and
Professionals
security has often
• Organizational Management and
been described as a
Professionals combination of art
This Photo by Unknown Author is licensed under CC
BY and science
Principles of Information Security - Chapter 1 Slide 45 Principles of Information Security - Chapter 1 Slide 46

Security as Art Security as Science


• No hard and fast rules nor are • Dealing with technology designed to perform at high
there many universally accepted levels of performance
complete solutions
• Specific conditions cause virtually all actions that
• No magic user’s manual for the occur in computer systems
security of the entire system
• Almost every fault, security hole, and systems
• Complex levels of interaction malfunction is a result of the interaction of specific
between users, policy, and hardware and software
technology controls
• If the developers had sufficient time, they could
resolve and eliminate these faults

Principles of Information Security - Chapter 1 Slide 47 Principles of Information Security - Chapter 1 Slide 48

8
1/28/2021

Security as a Social Science

• Social science examines the behavior of individuals interacting with


systems
• Security begins and ends with the people that interact with the system
• End users may be the weakest link in the security chain
• Security administrators can greatly reduce the levels of risk caused by
end users, and create more acceptable and supportable security
profiles
Principles of Information Security - Chapter 1 Slide 49

You might also like