SlideShare a Scribd company logo
INTRODUCTION TO INFORMATION  SYSTEMS SUPdeCO - PCM - English Track October 2008 Computer-Based Information Systems  Security PROF. DIANA MANGALAGIU MANAGEMENT AND STRATEGY DEPARTMENT
Concept of security «  The security of an information system is its non-vulnerability to accidents or deliberate attacks, that is the impossibility that those attacks have any serious impacts on the state and the operation of the system »  J. P. Magnier
Why security is a hot topic Security threats have highly increased in the last 10 years, with virtually no aspect of life left untouched, leaving opportunities to impersonate, modify, delete, or simply make mistakes and wreak havoc …. Financial transactions e.g. credit card details Sensitive information e.g. exam papers Downloaded programs, including applets
General   definitions Un sinistre Causes of vulnerability Immediate and long-term effects An attack or a natural disaster Disaster : Source: P. Reix
S ecurity guidelines : To handle security, it should be assessed using indicators including: 1 – Availability  of information and functionalities 2 – Truthfulness  of information 3 –  Confidentiality  of information 4 –  Non-repudiation  of communications 5 –  Traceability  of operations Potential causes of the disaster   make it essential to keep watch over the vulnerability of the system and thus over the  risks  it runs. General   definitions
Causes of disasters Category 1 – ACCIDENTS :  Material risks -  Breakdowns and failures of core hardware and software Category 2 – ERRORS:  Errors of information input, transmission and use Operating errors Errors of software design and development Category 3 – ABUSES : - Theft, material abuse Fraud, immaterial abuse Misappropriation of goods Fraudulent statements - Software hacking Category 4 – MISCELLANEOUS RISKS:  Strike - Departure of specialized staff
Security  planning Policies for security 1 – Material resource security 2 – Software security 3 – Application security 4 – General security steps 5 – Insurance The idea that security is entirely handled by hardware and software related procedures is a dangerous utopia as it must come with organizational thinking as well as awareness and training of individuals.
Four cornerstones of security & trust authentication integrity & non- authorisation confidentiality repudiation
Authentication The identities of all parties involved in an operation should be verified (including code sources) authentication
Integrity Ensure that information has not been tampered with authentication integrity
Non-repudiation Cannot deny that one is the sender of the info and/or that it has been received authentication integrity & non- repudiation
Confidentiality Only intended recipient can make sense of message or stored information authentication integrity & non- confidentiality repudiation
Authorisation Is the user allowed to perform these operations? authentication integrity & non- authorisation confidentiality repudiation
Security tradeoffs With unlimited resources, most forms of security can be broken Cost of breaking should outweigh reward Need to consider end-to-end security  A system is only as secure as its weakest part E.g. encryption with a private key is usually good, but the weakness is often the storage of the private key
Common web scenarios and their security aspects  Scenario 1: online banking Authentication:  is this a valid user?  Authorisation:  does this user have permission to access account information? Confidentiality : is account information secure from attack?  …  but must still be easy to use
Scenario 2: Downloading code Authentication : does the code come from a trusted source? Integrity : has the code been tampered with before or during downloading?  Authorisation : does the code have permission to carry out certain operations?
Scenario 3: online credit card transactions Authentication : does the credit card belong to the customer? Is the merchant valid? Is the merchant bank valid? Integrity : have any details been altered en route? Non-repudiation : can any of the parties deny that any aspects of the transaction took place? Confidentiality : should the merchant have access to credit card details? Should the bank have access to purchase details?

More Related Content

PDF
Securign siem for small business
PPTX
Threat Modelling And Threat Response
PDF
Cybersecurity: How to Protect Your Firm from a Cyber Attack
PPTX
Cyber security
PPTX
Cia security model
PDF
Cybersecurity Myths for Small and Medium-Sized Businesses
Securign siem for small business
Threat Modelling And Threat Response
Cybersecurity: How to Protect Your Firm from a Cyber Attack
Cyber security
Cia security model
Cybersecurity Myths for Small and Medium-Sized Businesses

What's hot (20)

PPT
E-Commerce Security
PPTX
Cybersecurity
PPTX
Protection from hacking attacks
PPTX
Cyber security
PPTX
Information security
PPT
2 Security And Internet Security
PPTX
Information Security Awareness
PDF
DRC -- Cybersecurity concepts2015
PPT
Iss lecture 1
PPT
SYSTEM SECURITY - Chapter 1 introduction
PPT
HIPAA, Privacy, Security, and Good Business
PPTX
DC970 Presents: Defense in Depth
PPTX
Unified Threat Management Vs Next-Gen Firewall: What's the difference?
PDF
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
PDF
Whitepaper next generation_patient_safety_bertine_mc_kenna.01
PPTX
презентация1
PDF
4. Mitigating a Cyber Attack
PDF
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
PPTX
What is network security and Types
PDF
Chapter 4 vulnerability threat and attack
E-Commerce Security
Cybersecurity
Protection from hacking attacks
Cyber security
Information security
2 Security And Internet Security
Information Security Awareness
DRC -- Cybersecurity concepts2015
Iss lecture 1
SYSTEM SECURITY - Chapter 1 introduction
HIPAA, Privacy, Security, and Good Business
DC970 Presents: Defense in Depth
Unified Threat Management Vs Next-Gen Firewall: What's the difference?
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Whitepaper next generation_patient_safety_bertine_mc_kenna.01
презентация1
4. Mitigating a Cyber Attack
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
What is network security and Types
Chapter 4 vulnerability threat and attack
Ad

Viewers also liked (20)

PPTX
Hula hoops
ODP
Presentacion house
PDF
Revolução Digital Pós NRF 2016
ODS
PPTX
Intranet homepage competition
PPT
Visiting Places
PDF
Marketology Social Media Masterclass presentation
PPTX
110118 Presentasion Proposal Thesis Print
PDF
Social Media Recruiting Israel 2011
PDF
מציאות ברשת
PDF
Wo ist Pluto?
PPTX
Mie presentation
PPT
PPTX
Intranets2012: Aligning your intranet to your business
PPT
Francia 2013
PPT
Intelligens ház
KEY
dddddddddddddddd
PPTX
Citadel Career Center - Leading the way
PPTX
Uranium!!!!
PPT
A New Entrepreneurship - A Backwards Approach
Hula hoops
Presentacion house
Revolução Digital Pós NRF 2016
Intranet homepage competition
Visiting Places
Marketology Social Media Masterclass presentation
110118 Presentasion Proposal Thesis Print
Social Media Recruiting Israel 2011
מציאות ברשת
Wo ist Pluto?
Mie presentation
Intranets2012: Aligning your intranet to your business
Francia 2013
Intelligens ház
dddddddddddddddd
Citadel Career Center - Leading the way
Uranium!!!!
A New Entrepreneurship - A Backwards Approach
Ad

Similar to Class4 Security (20)

PPT
Information Technology Security Basics
PDF
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
PDF
Management Information Systems
PPT
information security management
PDF
Your Skill Boost Masterclass Online Safety and Cybersecurity Tips
PDF
Cybersecurity Roadmap Development for Executives
PDF
New Age Red Teaming - Enterprise Infilteration
PPTX
Cyber Frontline - Level 2 - Module 1.pptx
PPTX
introduction of ethical hacking. (ppt)
PPTX
introduction of ethical hacking. ppt
PPT
Principles of information security Chapter 1 (1).ppt
PPT
Chapter 1 (1) (1).pptghtrtt76utrurtutrut
PDF
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
PPTX
Security for e commerce
PPTX
Introduction to Computer Security
PPT
Security Manager - Slides - Module 1 Powerpoint Presentation
PPT
Security Manager - Slides - Module 1 Powerpoint Presentation
PPT
Security Manager - Slides - Module 1 Powerpoint Presentation
PPTX
cyber security awareness------------.pptx
PDF
Understanding Endpoint Security: A Guide For Everyone
Information Technology Security Basics
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
Management Information Systems
information security management
Your Skill Boost Masterclass Online Safety and Cybersecurity Tips
Cybersecurity Roadmap Development for Executives
New Age Red Teaming - Enterprise Infilteration
Cyber Frontline - Level 2 - Module 1.pptx
introduction of ethical hacking. (ppt)
introduction of ethical hacking. ppt
Principles of information security Chapter 1 (1).ppt
Chapter 1 (1) (1).pptghtrtt76utrurtutrut
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Security for e commerce
Introduction to Computer Security
Security Manager - Slides - Module 1 Powerpoint Presentation
Security Manager - Slides - Module 1 Powerpoint Presentation
Security Manager - Slides - Module 1 Powerpoint Presentation
cyber security awareness------------.pptx
Understanding Endpoint Security: A Guide For Everyone

More from RMS (20)

PPT
2008 Rms Cross Cultural Management
 
PPT
2008 Rms Cross Cultural Management
 
PPTX
Amphi Creativite Entrepreneuriale Oct Dec 2006 Sans Photos
 
PPTX
Life Track
 
PPT
Personality Pcm
 
PPT
Ob
 
PPT
Perception Pcm P1
 
PPT
Intro I Mba Pcm
 
PPT
The Jim Davis Case
 
PPT
Perception Pcm P2
 
PPT
Foundations Of Leadership Pcm
 
PPT
Class3 Edi Ppt
 
PPT
Class2 Business Software
 
PPT
Class1 Intro Is
 
PPT
Pcm Mngt Acctg Budgetary Control
 
PPT
Pcm Mngt Acctg Conclusion
 
PPT
04 Marketing Concurrence
 
PPT
05 Marketing Diagnostic Interne ChaîNe Valeur
 
PPTX
06 StratéGies GéNéRiques
 
PPT
03 Marketing Marché
 
2008 Rms Cross Cultural Management
 
2008 Rms Cross Cultural Management
 
Amphi Creativite Entrepreneuriale Oct Dec 2006 Sans Photos
 
Life Track
 
Personality Pcm
 
Ob
 
Perception Pcm P1
 
Intro I Mba Pcm
 
The Jim Davis Case
 
Perception Pcm P2
 
Foundations Of Leadership Pcm
 
Class3 Edi Ppt
 
Class2 Business Software
 
Class1 Intro Is
 
Pcm Mngt Acctg Budgetary Control
 
Pcm Mngt Acctg Conclusion
 
04 Marketing Concurrence
 
05 Marketing Diagnostic Interne ChaîNe Valeur
 
06 StratéGies GéNéRiques
 
03 Marketing Marché
 

Recently uploaded (20)

PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Approach and Philosophy of On baking technology
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Empathic Computing: Creating Shared Understanding
PDF
cuic standard and advanced reporting.pdf
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
The AUB Centre for AI in Media Proposal.docx
Review of recent advances in non-invasive hemoglobin estimation
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Chapter 3 Spatial Domain Image Processing.pdf
MYSQL Presentation for SQL database connectivity
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Approach and Philosophy of On baking technology
Big Data Technologies - Introduction.pptx
Programs and apps: productivity, graphics, security and other tools
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Spectral efficient network and resource selection model in 5G networks
Machine learning based COVID-19 study performance prediction
Understanding_Digital_Forensics_Presentation.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Empathic Computing: Creating Shared Understanding
cuic standard and advanced reporting.pdf

Class4 Security

  • 1. INTRODUCTION TO INFORMATION SYSTEMS SUPdeCO - PCM - English Track October 2008 Computer-Based Information Systems Security PROF. DIANA MANGALAGIU MANAGEMENT AND STRATEGY DEPARTMENT
  • 2. Concept of security «  The security of an information system is its non-vulnerability to accidents or deliberate attacks, that is the impossibility that those attacks have any serious impacts on the state and the operation of the system » J. P. Magnier
  • 3. Why security is a hot topic Security threats have highly increased in the last 10 years, with virtually no aspect of life left untouched, leaving opportunities to impersonate, modify, delete, or simply make mistakes and wreak havoc …. Financial transactions e.g. credit card details Sensitive information e.g. exam papers Downloaded programs, including applets
  • 4. General definitions Un sinistre Causes of vulnerability Immediate and long-term effects An attack or a natural disaster Disaster : Source: P. Reix
  • 5. S ecurity guidelines : To handle security, it should be assessed using indicators including: 1 – Availability of information and functionalities 2 – Truthfulness of information 3 – Confidentiality of information 4 – Non-repudiation of communications 5 – Traceability of operations Potential causes of the disaster make it essential to keep watch over the vulnerability of the system and thus over the risks it runs. General definitions
  • 6. Causes of disasters Category 1 – ACCIDENTS : Material risks - Breakdowns and failures of core hardware and software Category 2 – ERRORS: Errors of information input, transmission and use Operating errors Errors of software design and development Category 3 – ABUSES : - Theft, material abuse Fraud, immaterial abuse Misappropriation of goods Fraudulent statements - Software hacking Category 4 – MISCELLANEOUS RISKS: Strike - Departure of specialized staff
  • 7. Security planning Policies for security 1 – Material resource security 2 – Software security 3 – Application security 4 – General security steps 5 – Insurance The idea that security is entirely handled by hardware and software related procedures is a dangerous utopia as it must come with organizational thinking as well as awareness and training of individuals.
  • 8. Four cornerstones of security & trust authentication integrity & non- authorisation confidentiality repudiation
  • 9. Authentication The identities of all parties involved in an operation should be verified (including code sources) authentication
  • 10. Integrity Ensure that information has not been tampered with authentication integrity
  • 11. Non-repudiation Cannot deny that one is the sender of the info and/or that it has been received authentication integrity & non- repudiation
  • 12. Confidentiality Only intended recipient can make sense of message or stored information authentication integrity & non- confidentiality repudiation
  • 13. Authorisation Is the user allowed to perform these operations? authentication integrity & non- authorisation confidentiality repudiation
  • 14. Security tradeoffs With unlimited resources, most forms of security can be broken Cost of breaking should outweigh reward Need to consider end-to-end security A system is only as secure as its weakest part E.g. encryption with a private key is usually good, but the weakness is often the storage of the private key
  • 15. Common web scenarios and their security aspects Scenario 1: online banking Authentication: is this a valid user? Authorisation: does this user have permission to access account information? Confidentiality : is account information secure from attack? … but must still be easy to use
  • 16. Scenario 2: Downloading code Authentication : does the code come from a trusted source? Integrity : has the code been tampered with before or during downloading? Authorisation : does the code have permission to carry out certain operations?
  • 17. Scenario 3: online credit card transactions Authentication : does the credit card belong to the customer? Is the merchant valid? Is the merchant bank valid? Integrity : have any details been altered en route? Non-repudiation : can any of the parties deny that any aspects of the transaction took place? Confidentiality : should the merchant have access to credit card details? Should the bank have access to purchase details?

Editor's Notes

  • #7: Bouygues Télécom : Sa panne informatique du 17/11/2004 lui coûte 16 millions d’Euros SNCF : 1000 terminaux paralysés en juillet 2004 Selon Microsoft , 2,4 milliards d’heures de travail dans les entreprises ce qui équivaut en France à 20€ de l’heure X 15 millions de personnes = 1,8 milliards d’euros de perte