Professional Documents
Culture Documents
Day-01-Information Security
Day-01-Information Security
Day-01-Information Security
Security Principles
Aug 19, 2023
Muhammad Wasi
Senior Application Security Analyst, BankIslami – Head Office
MS CYBERSECURITY, NUST UNIVERSITY
Why Information Security Matters?
In today's digital world, information/data is power. From personal data to sensitive business information,
everything is stored and transmitted online.
Information security matters because it protects our personal and financial data, intellectual property, and
other sensitive information from unauthorized access, use, disclosure, disruption, modification, or
destruction.
Why Information Security Matters?
Cyberattacks happen every day?
In every 39 seconds there is a cyberattack.
• By 2025, cybercrime will cost the world $10.5 trillion yearly.
• The entire cost of cyberattacks in 2022 was $6 trillion.
• 95% of data breaches are the result of human error.
• Globally, 30,000 websites are hacked daily.
Top Companies Hacked Previously
How much secure we are?
• https://cybermap.kaspersky.com/
• https://livethreatmap.radware.com/
What we will be covering ?
We will cover:
1. The differences between Information security, IT Security, and Cybersecurity
2. The CIA triad and IAAA
3. Privacy
4. Risk and incident management
5. Access control
1- Information Security, IT Security, and Cybersecurity
Information Security is all our information: Paper documents, voice information, data,
the knowledge people have.
IT Security is all our hard/software, and data: Computers, servers, networks, hardware,
software, firmware, and data being processed, stored, and communicated.
• Information security is about protecting information from all threats, whether they
come from physical or digital sources.
• Cybersecurity is about protecting information from threats that come from the digital
world, such as cyberattacks.
2- The CIA triad and IAAA
Threats:
• Attacks on your encryption (cryptanalysis).
• Social engineering.
• Key loggers (software/hardware), cameras, steganography.
2- The CIA triad and IAAA
Integrity:
We use:
• Cryptography.
• Message Digests are also known as a hash (This could be MD5, SHA1 or SHA256 etc.).
• Digital Signatures – non-repudiation.
• Access control.
Threats:
• Alterations of our data.
• Code injections.
• Attacks on your encryption (cryptanalysis).
2- The CIA triad and IAAA
Availability:
We use:
• IPS/IDS.
• Patch Management.
• Redundancy on hardware power (Multiple power supplies/UPS’s/generators),
Threats:
• Malicious attacks (DDOS, physical, system compromise, staff).
• Application failures (errors in the code).
• Component failure (Hardware).
2- The CIA triad and IAAA
Identification
• Your name, username, ID number, employee number, SSN etc.
• “I am Student”.
Authentication
▪ “Prove you are Student”. – Should always be done with multi-factor authentication!
• Something you know - Type 1 Authentication (passwords, pass phrase, PIN, etc.).
• Something you have - Type 2 Authentication (ID, passport, smart card, token, cookie on PC, etc.).
• Something you are - Type 3 Authentication (and Biometrics) (Fingerprint, iris scan, facial geometry,
etc.).
2- The CIA triad and IAAA
IAAA (Identification and Authentication, Authorization and Accountability)
Authorization
• What are you allowed to access?
• We use Access Control models. What and how we implement depends on the
organization and what our security goals are.
Non-repudiation.
A user cannot deny having performed a certain action. This uses both Authentication and
Integrity.
3- Privacy
A definition of Privacy:
1. The state or condition of being free from being observed or disturbed by other people.
2. Freedom from unauthorized intrusion.
• You as a citizen and consumer have the right that your Personally Identifiable
Information (PII) is being kept securely.
4- Risk Management
⬧ Detective:
Controls that Detect during or after an attack – IDS, CCTV, alarms, anti-virus.
⬧ Corrective:
Controls that Correct an attack – Anti-virus, patches, IPS.
5- Access Control Categories and Types
Access Control Types:
⬧ Recovery:
Controls that help us Recover after an attack – DR (Disaster Recovery) Environment,
backups, HA (High Availability Environments.
⬧ Compensating:
Controls that Compensate – When other controls are impossible or too costly to
implement.
What we covered?
We talked about:
▪ The differences between Information Security, IT Security, and Cybersecurity.
▪ The CIA triad and IAAA.
▪ Privacy.
▪ Risk management.
▪ Access control categories and types.