1. Information
Flow
ArfanShahzad.c
• Information flow is the exchange of information among
people, processes and systems within an organization.
• When you have employees working across different locations,
devices and departments, it can be difficult to keep
everyone on the same page.
• It’s very important to know information flow, for information
security.
5. Information Flow cont…
Controlling Information
flow
ArfanShahzad.c
• Information Flow Control (IFC) is a mechanism in which a
system may
track data movement from one location to another.
• It's a security technique that keeps track of information flow
between a system and the rest of the world (Internet).
6. Information Flow cont…
Controlling Information
flow
• Users want their credentials to remain private.
• Access control has traditionally been
the primary technique for stopping information from
being spread.
• Access control, on the other hand, is
insufficient in many instances since it demands
an all-or-nothing.
ArfanShahzad.c
7. Information Flow cont…
Controlling Information
flow
ArfanShahzad.c
• Data Classification: Information is classified into different
categories or levels based on its sensitivity. Common
classifications include public, internal, confidential, and
highly confidential.
• Data Flow Policies: Systems implement policies that define
how data can flow from one location or process to another.
These policies are typically based on the labels assigned to
8. Information Flow cont…
Controlling Information
flow
ArfanShahzad.c
• Information Tracking: Information flow control mechanisms
track the movement of data throughout the system. This
tracking helps ensure that data is handled appropriately.
• Data Sanitization: When data is declassified or downgraded,
it may need to be sanitized to remove sensitive
information. This process ensures that lower-level users
do not gain access to classified data.
9. Information Flow cont…
Controlling Information
flow
ArfanShahzad.c
• Audit and Compliance: Information flow control mechanisms
often include auditing capabilities to track and log data
movements for compliance and forensic purposes.