SlideShare a Scribd company logo
INFORMATION SYSTEM
SECURITY
Jupriyadi, S.Kom. M.T.
jupriyadi@teknokrat.ac.id
Bandarlampung, Juli 2021
Chapter 3
Security Principals
Authentication
Authorization or Access Control
Privacy / Confidentiality
Integrity
Availability
Non-repudiation
Auditing
Authentication
Stating that the data or information used or provided
by the user is the person's original
Countermeasure: Using Digital signature
Authentication
 Authentication is used by a server when the server needs to know exactly who
is accessing their information or site.
 Authentication is used by a client when the client needs to know that the
server is system it claims to be.
 In authentication, the user or computer has to prove its identity to the server or
client.
 Usually, authentication by a server entails the use of a user name and
password. Other ways to authenticate can be through cards, retina scans,
voice recognition, and fingerprints.
 Authentication by a client usually involves the server giving a certificate to the
client in which a trusted third party.
 Authentication does not determine what tasks the individual can do or what
files the individual can see. Authentication merely identifies and verifies who
the person or system is.
Three Schemes Authentication
• Password
Something
you know
• ID Card
Something
you have
• Finger Prints
Something
you are
Authorization or Access
Control
Setting who can do what, or from where to where. Can use
the mechanisms of user / password or other mechanism
Example:
ACL on Proxy Server
Authorization or Access
Control
 Authorization is a process by which a server determines if the client has
permission to use a resource or access a file.
 Authorization is usually coupled with authentication so that the server has
some concept of who the client is that is requesting access.
 The type of authentication required for authorization may vary; passwords may
be required in some cases but not in others.
 In some cases, there is no authorization; any user may be use a resource or
access a file simply by asking for it. Most of the web pages on the Internet
require no authentication or authorization.
Privacy/Confidentiality
Security of personal data, messages or other
sensitive information
Countermeasure: Using encryption
Integrity
Information or messages that are kept unchanged or
changed.
Availability
The availability of information security services.
Countermeasure : Firewall and router
filtering, backup and redundancy, IDS and IPS
Non-repudiation
Keeping that if it is done online transactions or
activities, it can not be disclaimed
Auditing
The existence of the file records data communications that
occur on the network for auditing purposes such as identifying
attacks on the network or server
Implementation : Using System Logging
Basic Terminology
 Threats
 natural threats
 unintentional threats
 intentional threats
 Vulnerabilities
 weakness in the design
 Configuration
 implementation
 Risk
 Attacks
What's Next ?

More Related Content

PDF
PDF
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
PPT
Security and information assurance
PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PDF
Chapter 4 vulnerability threat and attack
PDF
Ethical hacking and social engineering
PDF
55994241 cissp-cram
PDF
Fundamentals of information systems security ( pdf drive ) chapter 1
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Security and information assurance
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
Chapter 4 vulnerability threat and attack
Ethical hacking and social engineering
55994241 cissp-cram
Fundamentals of information systems security ( pdf drive ) chapter 1

What's hot (20)

PPTX
Architecting for Security Resilience
PDF
E commerce Security
PPTX
Data base security and injection
DOCX
VAPT- A Service on Eucalyptus Cloud
PDF
Ch19 E Commerce Security
PDF
Chapter 2 konsep dasar keamanan
PDF
Chapter 15 incident handling
PPTX
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PPTX
Security and management
PDF
Two-factor authentication- A sample writing _Zaman
PPTX
Data and Message Security
PPTX
Threat Modeling - Writing Secure Code
PPTX
information security(authentication application, Authentication and Access Co...
PPTX
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PPT
E business security
PPT
Security in e-commerce
PPTX
5 Security Tips to Protect Your Login Credentials and More
PPTX
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PDF
Combating Phishing Attacks
Architecting for Security Resilience
E commerce Security
Data base security and injection
VAPT- A Service on Eucalyptus Cloud
Ch19 E Commerce Security
Chapter 2 konsep dasar keamanan
Chapter 15 incident handling
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
Security and management
Two-factor authentication- A sample writing _Zaman
Data and Message Security
Threat Modeling - Writing Secure Code
information security(authentication application, Authentication and Access Co...
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
E business security
Security in e-commerce
5 Security Tips to Protect Your Login Credentials and More
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
Combating Phishing Attacks
Ad

Similar to Chapter 3 security principals (20)

PDF
network security.pdf
PDF
CyberSecurity101.pdf
PDF
information security introduction for campus students.pdf
PPT
Technical seminar on Security
PPTX
2 security concepts
PPT
educational content,educational content,educational content,
PDF
information security (security fundamental)
PDF
What is Authentication vs Authorization Difference? | INTROSERV
PDF
Basic security concepts_chapter_1_6perpage
PPT
1 security goals
PPTX
Access control
PPT
InfoSecConcepts.ppt
PPTX
Computer Security Primer - Eric Vanderburg - JURINNOV
PPT
Lecture 01- What is Information Security.ppt
PPTX
Security Architectures and Models.pptx
PPTX
Computer Literacy Chapter_1_Unit1_2022.ppt
PPTX
Health information security 2 : Basic concepts
PPTX
informations_security_presentations.pptx
PPTX
Information Security
PPTX
Information Security
network security.pdf
CyberSecurity101.pdf
information security introduction for campus students.pdf
Technical seminar on Security
2 security concepts
educational content,educational content,educational content,
information security (security fundamental)
What is Authentication vs Authorization Difference? | INTROSERV
Basic security concepts_chapter_1_6perpage
1 security goals
Access control
InfoSecConcepts.ppt
Computer Security Primer - Eric Vanderburg - JURINNOV
Lecture 01- What is Information Security.ppt
Security Architectures and Models.pptx
Computer Literacy Chapter_1_Unit1_2022.ppt
Health information security 2 : Basic concepts
informations_security_presentations.pptx
Information Security
Information Security
Ad

More from newbie2019 (20)

PDF
Digital forensic principles and procedure
PDF
Fundamental digital forensik
PDF
Pendahuluan it forensik
PDF
Chapter 14 sql injection
PDF
Chapter 13 web security
PDF
NIST Framework for Information System
PDF
Nist.sp.800 37r2
PDF
Chapter 12 iso 27001 awareness
PDF
Chapter 10 security standart
PDF
Chapter 8 cryptography lanjutan
PDF
Pertemuan 7 cryptography
PDF
Chapter 6 information hiding (steganography)
PDF
Vulnerability threat and attack
PDF
Chapter 1 introduction
PDF
CCNA RSE Routing concept
PPT
Chapter 1 introduction
PPTX
Sca nv6 instructorppt_chapter2
PPTX
Ccna rse chp9 nat fo i_pv4
PDF
ether channel_hsrp
PDF
Ccna rse chp7 Access Control List (ACL)
Digital forensic principles and procedure
Fundamental digital forensik
Pendahuluan it forensik
Chapter 14 sql injection
Chapter 13 web security
NIST Framework for Information System
Nist.sp.800 37r2
Chapter 12 iso 27001 awareness
Chapter 10 security standart
Chapter 8 cryptography lanjutan
Pertemuan 7 cryptography
Chapter 6 information hiding (steganography)
Vulnerability threat and attack
Chapter 1 introduction
CCNA RSE Routing concept
Chapter 1 introduction
Sca nv6 instructorppt_chapter2
Ccna rse chp9 nat fo i_pv4
ether channel_hsrp
Ccna rse chp7 Access Control List (ACL)

Recently uploaded (20)

PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Complications of Minimal Access Surgery at WLH
PDF
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
PDF
Yogi Goddess Pres Conference Studio Updates
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
Weekly quiz Compilation Jan -July 25.pdf
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
Trump Administration's workforce development strategy
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
2.FourierTransform-ShortQuestionswithAnswers.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Orientation - ARALprogram of Deped to the Parents.pptx
Anesthesia in Laparoscopic Surgery in India
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Complications of Minimal Access Surgery at WLH
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
Yogi Goddess Pres Conference Studio Updates
History, Philosophy and sociology of education (1).pptx
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Weekly quiz Compilation Jan -July 25.pdf
UNIT III MENTAL HEALTH NURSING ASSESSMENT
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Paper A Mock Exam 9_ Attempt review.pdf.
Practical Manual AGRO-233 Principles and Practices of Natural Farming
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Trump Administration's workforce development strategy
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx

Chapter 3 security principals

  • 1. INFORMATION SYSTEM SECURITY Jupriyadi, S.Kom. M.T. jupriyadi@teknokrat.ac.id Bandarlampung, Juli 2021 Chapter 3
  • 2. Security Principals Authentication Authorization or Access Control Privacy / Confidentiality Integrity Availability Non-repudiation Auditing
  • 3. Authentication Stating that the data or information used or provided by the user is the person's original Countermeasure: Using Digital signature
  • 4. Authentication  Authentication is used by a server when the server needs to know exactly who is accessing their information or site.  Authentication is used by a client when the client needs to know that the server is system it claims to be.  In authentication, the user or computer has to prove its identity to the server or client.  Usually, authentication by a server entails the use of a user name and password. Other ways to authenticate can be through cards, retina scans, voice recognition, and fingerprints.  Authentication by a client usually involves the server giving a certificate to the client in which a trusted third party.  Authentication does not determine what tasks the individual can do or what files the individual can see. Authentication merely identifies and verifies who the person or system is.
  • 5. Three Schemes Authentication • Password Something you know • ID Card Something you have • Finger Prints Something you are
  • 6. Authorization or Access Control Setting who can do what, or from where to where. Can use the mechanisms of user / password or other mechanism Example: ACL on Proxy Server
  • 7. Authorization or Access Control  Authorization is a process by which a server determines if the client has permission to use a resource or access a file.  Authorization is usually coupled with authentication so that the server has some concept of who the client is that is requesting access.  The type of authentication required for authorization may vary; passwords may be required in some cases but not in others.  In some cases, there is no authorization; any user may be use a resource or access a file simply by asking for it. Most of the web pages on the Internet require no authentication or authorization.
  • 8. Privacy/Confidentiality Security of personal data, messages or other sensitive information Countermeasure: Using encryption
  • 9. Integrity Information or messages that are kept unchanged or changed.
  • 10. Availability The availability of information security services. Countermeasure : Firewall and router filtering, backup and redundancy, IDS and IPS
  • 11. Non-repudiation Keeping that if it is done online transactions or activities, it can not be disclaimed
  • 12. Auditing The existence of the file records data communications that occur on the network for auditing purposes such as identifying attacks on the network or server Implementation : Using System Logging
  • 13. Basic Terminology  Threats  natural threats  unintentional threats  intentional threats  Vulnerabilities  weakness in the design  Configuration  implementation  Risk  Attacks