SlideShare a Scribd company logo
3
Most read
5
Most read
10
Most read
Principles of Information Security,
Fifth Edition
Chapter 2
The Need for Security
Lesson 4–Technical Hardware
Learning Objectives
• Upon completion of this lesson, you should be able
to:
– Describe the relationship between technical hardware
failures and errors ,and technical software failures and
errors against information within systems.
Principles of Information Security, Fifth Edition 2
Technical Hardware Failures or Errors
• They occur when a manufacturer distributes
equipment containing a known or unknown flaw.
• They can cause the system to perform outside of
expected parameters, resulting in unreliable
service or lack of availability.
• Some errors are terminal and some are
intermittent.
• Intel Pentium CPU failure
• Mean time between failure measures the amount of
time between hardware failures.
Principles of Information Security, Fifth Edition 3
Technical Software Failures or Errors
(cont’d)
• Large quantities of computer code are written,
debugged, published, and sold before all bugs are
detected and resolved.
• Combinations of certain software and hardware
can reveal new software bugs.
• Entire Web sites are dedicated to documenting
bugs.
• Open Web Application Security Project (OWASP)
is dedicated to helping organizations
create/operate trustworthy software and publishes
a list of top security risks.
Principles of Information Security, Fifth Edition 4
The Deadly Sins in Software Security
• Common failures in software development:
– Buffer overruns
– Command injection
– Cross-site scripting (XSS)
– Failure to handle errors
– Failure to protect network traffic
– Failure to store and protect data securely
– Failure to use cryptographically strong random
numbers
Principles of Information Security, Fifth Edition 5
The Deadly Sins in Software Security
(cont’d)
• Common failures in software development (cont’d):
– Format string problems
– Neglecting change control
– Improper file access
– Improper use of SSL
– Information leakage
– Integer bugs (overflows/underflows)
– Race conditions
– SQL injection
Principles of Information Security, Fifth Edition 6
The Deadly Sins in Software Security
(cont’d)
• Problem areas in software development:
– Trusting network address resolution
– Unauthenticated key exchange
– Use of magic URLs and hidden forms
– Use of weak password-based systems
– Poor usability
Principles of Information Security, Fifth Edition 7
Technological Obsolescence
• Antiquated/outdated infrastructure can lead to
unreliable, untrustworthy systems.
• Proper managerial planning should prevent
technology obsolescence.
• IT plays a large role.
Principles of Information Security, Fifth Edition 8
Theft
• Illegal taking of another’s physical, electronic, or
intellectual property
• Physical theft is controlled relatively easily.
• Electronic theft is a more complex problem; the
evidence of crime is not readily apparent.
Principles of Information Security, Fifth Edition 9
Secure Software Development
• Many information security issues discussed here
are caused by software elements of the system.
• Development of software and systems is often
accomplished using methodology such as systems
development life cycle (SDLC).
• Many organizations recognize the need for security
objectives in SDLC and have included procedures
to create more secure software.
• This software development approach is known as
Software Assurance (SA).
Principles of Information Security, Fifth Edition 10
Software Assurance and the SA
Common Body of Knowledge
• A national effort is underway to create a common
body of knowledge focused on secure software
development.
• U.S. Department of Defense and Department of
Homeland Security supported the Software
Assurance Initiative, which resulted in the
publication of Secure Software Assurance (SwA)
Common Body of Knowledge (CBK).
• SwA CBK serves as a strongly recommended
guide to developing more secure applications.
Principles of Information Security, Fifth Edition 11
Software Design Principles
• Good software development results in secure
products that meet all design specifications.
• Some commonplace security principles:
– Keep design simple and small
– Access decisions by permission not exclusion
– Every access to every object checked for authority
– Design depends on possession of keys/passwords
– Protection mechanisms require two keys to unlock
– Programs/users utilize only necessary privileges
Principles of Information Security, Fifth Edition 12
Software Design Principles (cont’d)
• Some commonplace security principles:
– Minimize mechanisms common to multiple users
– Human interface must be easy to use so users
routinely/automatically use protection mechanisms.
Principles of Information Security, Fifth Edition 13
Summary
• Unlike any other aspect of IT, information security’s
primary mission is to ensure things stay the way
they are.
• Information security performs four important
functions:
– Protects organization’s ability to function
– Enables safe operation of applications implemented
on organization’s IT systems
– Protects data the organization collects and uses
– Safeguards the technology assets in use at the
organization
Principles of Information Security, Fifth Edition 14
Summary (cont’d)
• Threat: object, person, or other entity representing
a constant danger to an asset
• Management effectively protects its information
through policy, education, training, and technology
controls.
• Attack: a deliberate act that exploits vulnerability
• Secure systems require secure software.
Principles of Information Security, Fifth Edition 15

More Related Content

PPTX
Legal, Ethical, and Professional Issues In Information Security
PPT
Database Chapter 3
PPT
Information Assurance And Security - Chapter 2 - Lesson 3
PPT
Information Assurance And Security - Chapter 2 - Lesson 1
PPT
Information Assurance And Security - Chapter 1 - Lesson 1
PDF
INFORMATION ASSURANCE AND SECURITY 1.pdf
PDF
Information Security Risk Management
PPTX
Threats to information security
Legal, Ethical, and Professional Issues In Information Security
Database Chapter 3
Information Assurance And Security - Chapter 2 - Lesson 3
Information Assurance And Security - Chapter 2 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1
INFORMATION ASSURANCE AND SECURITY 1.pdf
Information Security Risk Management
Threats to information security

What's hot (20)

PPT
Introduction to information security
PDF
DDBMS Paper with Solution
PPTX
Introduction to Systems Analysis and Design
PPTX
System Security-Chapter 1
PDF
Lecture-1: Introduction to system integration and architecture - course overv...
PPTX
Information security: importance of having defined policy & process
PPT
Information Assurance And Security - Chapter 1 - Lesson 4
PPT
Information Assurance And Security - Chapter 3 - Lesson 1
PPT
Lecture 1 Information System
PPT
Lesson 1- Intrusion Detection
PPT
Information Assurance And Security - Chapter 2 - Lesson 2
PPT
Ch08-Architecture Design
PPT
Transaction management and concurrency control
PPT
Information Assurance And Security - Chapter 1 - Lesson 3
PPTX
Chapter-1 Introduction to Database Management Systems
PPT
chapter 1. Introduction to Information Security
PPTX
Information Security Lecture #1 ppt
PPTX
Introduction to Information Security
PPTX
Cyber Security Organizational Operating Model and Governance
PPTX
OLAP & DATA WAREHOUSE
Introduction to information security
DDBMS Paper with Solution
Introduction to Systems Analysis and Design
System Security-Chapter 1
Lecture-1: Introduction to system integration and architecture - course overv...
Information security: importance of having defined policy & process
Information Assurance And Security - Chapter 1 - Lesson 4
Information Assurance And Security - Chapter 3 - Lesson 1
Lecture 1 Information System
Lesson 1- Intrusion Detection
Information Assurance And Security - Chapter 2 - Lesson 2
Ch08-Architecture Design
Transaction management and concurrency control
Information Assurance And Security - Chapter 1 - Lesson 3
Chapter-1 Introduction to Database Management Systems
chapter 1. Introduction to Information Security
Information Security Lecture #1 ppt
Introduction to Information Security
Cyber Security Organizational Operating Model and Governance
OLAP & DATA WAREHOUSE
Ad

Similar to Information Assurance And Security - Chapter 2 - Lesson 4 (20)

PDF
Embedded Systems Security
PDF
Java Card Platform Security and Performance
PDF
IoT Security and Privacy Considerations
PPT
Chapter 5 cyber security in computer.ppt
PPTX
Enumerating software security design flaws throughout the SSDLC
PPTX
Enumerating software security design flaws throughout the ssdlc cosac - 201...
PPT
Survey Presentation About Application Security
PPTX
Starting your Career in Information Security
PDF
Hardware Security on Vehicles
PPTX
OWASP Mobile TOP 10 2014
PPTX
SDL: Secure design principles
PPTX
Cyber security - It starts with the embedded system
PDF
Oracle ADF Architecture TV - Design - Designing for Security
PPT
Lecture Course Outline and Secure SDLC.ppt
PDF
Applying formal methods to existing software by B.Monate
PPT
4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt
PPT
ITE v5.0 - Chapter 10
PPTX
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...
PPT
Security Testing for Mobile and Web Apps
PDF
Tips and Tricks for Building Secure Mobile Apps
Embedded Systems Security
Java Card Platform Security and Performance
IoT Security and Privacy Considerations
Chapter 5 cyber security in computer.ppt
Enumerating software security design flaws throughout the SSDLC
Enumerating software security design flaws throughout the ssdlc cosac - 201...
Survey Presentation About Application Security
Starting your Career in Information Security
Hardware Security on Vehicles
OWASP Mobile TOP 10 2014
SDL: Secure design principles
Cyber security - It starts with the embedded system
Oracle ADF Architecture TV - Design - Designing for Security
Lecture Course Outline and Secure SDLC.ppt
Applying formal methods to existing software by B.Monate
4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt
ITE v5.0 - Chapter 10
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...
Security Testing for Mobile and Web Apps
Tips and Tricks for Building Secure Mobile Apps
Ad

More from MLG College of Learning, Inc (20)

PPTX
PPTX
PC111-lesson1.pptx
PPTX
PC LEESOON 6.pptx
PPTX
PC 106 PPT-09.pptx
PPTX
PPTX
PPTX
PPTX
PC 106 Slide no.02
PPTX
PPTX
PPTX
PC 106 Slide 1.pptx
PDF
Db2 characteristics of db ms
PDF

Recently uploaded (20)

PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
A systematic review of self-coping strategies used by university students to ...
PDF
Indian roads congress 037 - 2012 Flexible pavement
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Cell Types and Its function , kingdom of life
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PDF
Classroom Observation Tools for Teachers
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PDF
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
What if we spent less time fighting change, and more time building what’s rig...
Final Presentation General Medicine 03-08-2024.pptx
202450812 BayCHI UCSC-SV 20250812 v17.pptx
A systematic review of self-coping strategies used by university students to ...
Indian roads congress 037 - 2012 Flexible pavement
History, Philosophy and sociology of education (1).pptx
Complications of Minimal Access Surgery at WLH
Cell Types and Its function , kingdom of life
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
A powerpoint presentation on the Revised K-10 Science Shaping Paper
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
Practical Manual AGRO-233 Principles and Practices of Natural Farming
Classroom Observation Tools for Teachers
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
Supply Chain Operations Speaking Notes -ICLT Program
What if we spent less time fighting change, and more time building what’s rig...

Information Assurance And Security - Chapter 2 - Lesson 4

  • 1. Principles of Information Security, Fifth Edition Chapter 2 The Need for Security Lesson 4–Technical Hardware
  • 2. Learning Objectives • Upon completion of this lesson, you should be able to: – Describe the relationship between technical hardware failures and errors ,and technical software failures and errors against information within systems. Principles of Information Security, Fifth Edition 2
  • 3. Technical Hardware Failures or Errors • They occur when a manufacturer distributes equipment containing a known or unknown flaw. • They can cause the system to perform outside of expected parameters, resulting in unreliable service or lack of availability. • Some errors are terminal and some are intermittent. • Intel Pentium CPU failure • Mean time between failure measures the amount of time between hardware failures. Principles of Information Security, Fifth Edition 3
  • 4. Technical Software Failures or Errors (cont’d) • Large quantities of computer code are written, debugged, published, and sold before all bugs are detected and resolved. • Combinations of certain software and hardware can reveal new software bugs. • Entire Web sites are dedicated to documenting bugs. • Open Web Application Security Project (OWASP) is dedicated to helping organizations create/operate trustworthy software and publishes a list of top security risks. Principles of Information Security, Fifth Edition 4
  • 5. The Deadly Sins in Software Security • Common failures in software development: – Buffer overruns – Command injection – Cross-site scripting (XSS) – Failure to handle errors – Failure to protect network traffic – Failure to store and protect data securely – Failure to use cryptographically strong random numbers Principles of Information Security, Fifth Edition 5
  • 6. The Deadly Sins in Software Security (cont’d) • Common failures in software development (cont’d): – Format string problems – Neglecting change control – Improper file access – Improper use of SSL – Information leakage – Integer bugs (overflows/underflows) – Race conditions – SQL injection Principles of Information Security, Fifth Edition 6
  • 7. The Deadly Sins in Software Security (cont’d) • Problem areas in software development: – Trusting network address resolution – Unauthenticated key exchange – Use of magic URLs and hidden forms – Use of weak password-based systems – Poor usability Principles of Information Security, Fifth Edition 7
  • 8. Technological Obsolescence • Antiquated/outdated infrastructure can lead to unreliable, untrustworthy systems. • Proper managerial planning should prevent technology obsolescence. • IT plays a large role. Principles of Information Security, Fifth Edition 8
  • 9. Theft • Illegal taking of another’s physical, electronic, or intellectual property • Physical theft is controlled relatively easily. • Electronic theft is a more complex problem; the evidence of crime is not readily apparent. Principles of Information Security, Fifth Edition 9
  • 10. Secure Software Development • Many information security issues discussed here are caused by software elements of the system. • Development of software and systems is often accomplished using methodology such as systems development life cycle (SDLC). • Many organizations recognize the need for security objectives in SDLC and have included procedures to create more secure software. • This software development approach is known as Software Assurance (SA). Principles of Information Security, Fifth Edition 10
  • 11. Software Assurance and the SA Common Body of Knowledge • A national effort is underway to create a common body of knowledge focused on secure software development. • U.S. Department of Defense and Department of Homeland Security supported the Software Assurance Initiative, which resulted in the publication of Secure Software Assurance (SwA) Common Body of Knowledge (CBK). • SwA CBK serves as a strongly recommended guide to developing more secure applications. Principles of Information Security, Fifth Edition 11
  • 12. Software Design Principles • Good software development results in secure products that meet all design specifications. • Some commonplace security principles: – Keep design simple and small – Access decisions by permission not exclusion – Every access to every object checked for authority – Design depends on possession of keys/passwords – Protection mechanisms require two keys to unlock – Programs/users utilize only necessary privileges Principles of Information Security, Fifth Edition 12
  • 13. Software Design Principles (cont’d) • Some commonplace security principles: – Minimize mechanisms common to multiple users – Human interface must be easy to use so users routinely/automatically use protection mechanisms. Principles of Information Security, Fifth Edition 13
  • 14. Summary • Unlike any other aspect of IT, information security’s primary mission is to ensure things stay the way they are. • Information security performs four important functions: – Protects organization’s ability to function – Enables safe operation of applications implemented on organization’s IT systems – Protects data the organization collects and uses – Safeguards the technology assets in use at the organization Principles of Information Security, Fifth Edition 14
  • 15. Summary (cont’d) • Threat: object, person, or other entity representing a constant danger to an asset • Management effectively protects its information through policy, education, training, and technology controls. • Attack: a deliberate act that exploits vulnerability • Secure systems require secure software. Principles of Information Security, Fifth Edition 15