SlideShare a Scribd company logo
CIS 264
Highline Community College
        Dan Morrill
 CIA is:
   Confidentiality
   Integrity
   Availability
 The entire information security industry is based on
  this concept for Defense
   Offense is a totally different matter, we want to corrupt
    CIA as much as possible for the other person
 There are entire manuals on this subject
   http://csrc.nist.gov/publications/nistpubs/800-
    33/sp800-33.pdf is a good start
 Confidentiality refers to preventing the disclosure of information
  to unauthorized individuals or systems. For example, a credit
  card transaction on the Internet requires the credit card number
  to be transmitted from the buyer to the merchant and from the
  merchant to a transaction processing network. The system
  attempts to enforce confidentiality by encrypting the card
  number during transmission, by limiting the places where it
  might appear (in databases, log files, backups, printed
  receipts, and so on), and by restricting access to the places where
  it is stored. If an unauthorized party obtains the card number in
  any way, a breach of confidentiality has occurred.

 Confidentiality is necessary (but not sufficient) for maintaining
  the privacy of the people whose personal information a system
  holds
 In information security, data integrity means
 maintaining and assuring the accuracy and
 consistency of data over its entire life-cycle. This
 means that data cannot be modified, unauthorized, or
 undetected. This is not the same thing as referential
 integrity in databases, although it can be viewed as a
 special case of Consistency as understood in the classic
 ACID model of transaction processing. Integrity is
 violated when a message is actively modified in transit.
 Information security systems typically provide
 message integrity in addition to data confidentiality.
 For any information system to serve its purpose, the
 information must be available when it is needed. This
 means that the computing systems used to store and
 process the information, the security controls used to
 protect it, and the communication channels used to
 access it must be functioning correctly. High
 availability systems aim to remain available at all
 times, preventing service disruptions due to power
 outages, hardware failures, and system upgrades.
 Ensuring availability also involves preventing denial-
 of-service attacks.
Information security principles
 Identification – am I who I say I am when I log in? If I
  know your router operating system – I know how to
  hack it and fake the router out
 Authentication – same thing – if I can fake it I can
  make it do my own thing
 Accountability – if I can log in as someone else, no one
  will hold me accountable
 Authorization – if I am root, I can do anything I want
  to do
   How long does it take to crack a Cisco Password using
    IOS 12.0(10)W5(18g)
Oh really?

Thanks Google and
Shodan

If I own two routers
on the internet

What can I do?

Where are the limits

Can I get caught?
And this is why they have formal development and
              management processes
 IATF (Information Assurance Technical Framework)
   People
      There must be a commitment to the process
         Training, Roles and Responsibilities, Policies and
          Procedures, Commitment, Penalties for violating
   Technology
      That the organization has the proper technologies in place
         Risk Assessment, Patching, Architecture, Validated products in
          use, Configuration
   Operations
      Day to Day activities promote effective security
         Enforcement, certification and accreditation, key management
Information security principles
 System Characterization
 Threat Identification
 Vulnerability Identification
 Control Analysis
 Likelihood determination
 Impact analysis
 Risk determination
 Control determination
 Results documentation
 Risk Assumption
 Risk Avoidance
 Risk Limitation
 Risk Planning
 Research and Development
 Risk Transference


 Supporting, Preventative, Detection and Recovering
 Controls
Information security principles

More Related Content

PPT
002.itsecurity bcp v1
PDF
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
PDF
Information Security Intelligence
PPTX
Optimizing Security Operations: 5 Keys to Success
PPTX
Security architecture, engineering and operations
PPT
Information Security Management.Introduction
PDF
Understanding security operation.pptx
PDF
Incident response methodology
002.itsecurity bcp v1
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Information Security Intelligence
Optimizing Security Operations: 5 Keys to Success
Security architecture, engineering and operations
Information Security Management.Introduction
Understanding security operation.pptx
Incident response methodology

What's hot (19)

DOCX
Security architecture principles isys 0575general att
PPTX
Architecting for Security Resilience
PPTX
Security Operations Center
PDF
"Thinking diffrent" about your information security strategy
DOCX
Residency research makeup project acme enterprise scenario resi
DOCX
The NIST Cybersecurity Framework
PDF
Defense In Depth Using NIST 800-30
PPT
Assuring Reliable and Secure IT Services
PDF
From Business Architecture to Security Architecture
PPT
Layered Approach - Information Security Recommendations
PPTX
Cissp- Security and Risk Management
PPTX
Cyber Security Landscape: Changes, Threats and Challenges
PDF
Why Zero Trust Yields Maximum Security
PDF
PCI DSS Implementation: A Five Step Guide
PDF
The Cyber Security Landscape: An OurCrowd Briefing for Investors
PPTX
Cyber Security Needs and Challenges
PPTX
Logging, monitoring and auditing
PPTX
A holistic approach to risk management 20210210 w acfe france & cyber rea...
PDF
A Case Study of the Capital One Data Breach
Security architecture principles isys 0575general att
Architecting for Security Resilience
Security Operations Center
"Thinking diffrent" about your information security strategy
Residency research makeup project acme enterprise scenario resi
The NIST Cybersecurity Framework
Defense In Depth Using NIST 800-30
Assuring Reliable and Secure IT Services
From Business Architecture to Security Architecture
Layered Approach - Information Security Recommendations
Cissp- Security and Risk Management
Cyber Security Landscape: Changes, Threats and Challenges
Why Zero Trust Yields Maximum Security
PCI DSS Implementation: A Five Step Guide
The Cyber Security Landscape: An OurCrowd Briefing for Investors
Cyber Security Needs and Challenges
Logging, monitoring and auditing
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A Case Study of the Capital One Data Breach
Ad

Similar to Information security principles (20)

PPTX
security IDS
DOCX
The CIA Triad - Assurance on Information Security
PDF
Top Cyber Security Interview Questions and Answers 2022.pdf
PDF
Information security
PDF
Cyber Security Matters a book by Hama David Bundo
PPTX
Information Systems.pptx
PDF
Cybersecurity Interview Questions and Answers.pdf
PDF
Information Technology Security Is Vital For The Success...
PDF
Safeguarding Sensitive Data with Encryption
DOC
Information security
PDF
CIA = Confidentiality of information, Integrity of information, Avai.pdf
PDF
INTERVIEW QUESTION FOR IT AUDITOR
PDF
Cyber security
PDF
it2042-unit1.pd AIM To study the critical need for ensuring Information Secu...
PDF
Enhanced method for intrusion detection over kdd cup 99 dataset
PDF
Security and Privacy Considerations in the Open Network for Digital Commerce.pdf
PPTX
Information System Security
PDF
Fundamentals of-information-security
PPTX
Module 2 - Information Assurance Concepts.pptx
PPTX
Cloud computing
security IDS
The CIA Triad - Assurance on Information Security
Top Cyber Security Interview Questions and Answers 2022.pdf
Information security
Cyber Security Matters a book by Hama David Bundo
Information Systems.pptx
Cybersecurity Interview Questions and Answers.pdf
Information Technology Security Is Vital For The Success...
Safeguarding Sensitive Data with Encryption
Information security
CIA = Confidentiality of information, Integrity of information, Avai.pdf
INTERVIEW QUESTION FOR IT AUDITOR
Cyber security
it2042-unit1.pd AIM To study the critical need for ensuring Information Secu...
Enhanced method for intrusion detection over kdd cup 99 dataset
Security and Privacy Considerations in the Open Network for Digital Commerce.pdf
Information System Security
Fundamentals of-information-security
Module 2 - Information Assurance Concepts.pptx
Cloud computing
Ad

More from Dan Morrill (19)

PPTX
Windows power shell and active directory
PPTX
Windows power shell basics
PPTX
Understanding web site analytics
PPTX
Process monitoring in UNIX shell scripting
PPTX
Creating a keystroke logger in unix shell scripting
PPTX
Understanding UNIX CASE and TPUT
PPTX
Using Regular Expressions in Grep
PPTX
Understanding the security_organization
PPTX
You should ask before copying that media
PPTX
Cis 216 – shell scripting
PPTX
Understanding advanced persistent threats (APT)
PPTX
AWS Hadoop and PIG and overview
PPTX
What is cloud computing
PPT
Social Media Plan for CityU of Seattle
PPT
BSIS Overview
PPT
Case Studies In Social Media Chinese
PPT
Case Studies In Social Media
PPT
Turn On Tune In Step Out
PPT
Technology And The Future Of Management
Windows power shell and active directory
Windows power shell basics
Understanding web site analytics
Process monitoring in UNIX shell scripting
Creating a keystroke logger in unix shell scripting
Understanding UNIX CASE and TPUT
Using Regular Expressions in Grep
Understanding the security_organization
You should ask before copying that media
Cis 216 – shell scripting
Understanding advanced persistent threats (APT)
AWS Hadoop and PIG and overview
What is cloud computing
Social Media Plan for CityU of Seattle
BSIS Overview
Case Studies In Social Media Chinese
Case Studies In Social Media
Turn On Tune In Step Out
Technology And The Future Of Management

Recently uploaded (20)

PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PPTX
Cell Structure & Organelles in detailed.
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
GDM (1) (1).pptx small presentation for students
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Insiders guide to clinical Medicine.pdf
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
The Final Stretch: How to Release a Game and Not Die in the Process.
PPTX
master seminar digital applications in india
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
Cardiovascular Pharmacology for pharmacy students.pptx
PDF
01-Introduction-to-Information-Management.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
STATICS OF THE RIGID BODIES Hibbelers.pdf
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
Cell Structure & Organelles in detailed.
2.FourierTransform-ShortQuestionswithAnswers.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
GDM (1) (1).pptx small presentation for students
Microbial diseases, their pathogenesis and prophylaxis
Renaissance Architecture: A Journey from Faith to Humanism
O7-L3 Supply Chain Operations - ICLT Program
Insiders guide to clinical Medicine.pdf
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
The Final Stretch: How to Release a Game and Not Die in the Process.
master seminar digital applications in india
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Cardiovascular Pharmacology for pharmacy students.pptx
01-Introduction-to-Information-Management.pdf
Anesthesia in Laparoscopic Surgery in India

Information security principles

  • 1. CIS 264 Highline Community College Dan Morrill
  • 2.  CIA is:  Confidentiality  Integrity  Availability  The entire information security industry is based on this concept for Defense  Offense is a totally different matter, we want to corrupt CIA as much as possible for the other person  There are entire manuals on this subject  http://csrc.nist.gov/publications/nistpubs/800- 33/sp800-33.pdf is a good start
  • 3.  Confidentiality refers to preventing the disclosure of information to unauthorized individuals or systems. For example, a credit card transaction on the Internet requires the credit card number to be transmitted from the buyer to the merchant and from the merchant to a transaction processing network. The system attempts to enforce confidentiality by encrypting the card number during transmission, by limiting the places where it might appear (in databases, log files, backups, printed receipts, and so on), and by restricting access to the places where it is stored. If an unauthorized party obtains the card number in any way, a breach of confidentiality has occurred.  Confidentiality is necessary (but not sufficient) for maintaining the privacy of the people whose personal information a system holds
  • 4.  In information security, data integrity means maintaining and assuring the accuracy and consistency of data over its entire life-cycle. This means that data cannot be modified, unauthorized, or undetected. This is not the same thing as referential integrity in databases, although it can be viewed as a special case of Consistency as understood in the classic ACID model of transaction processing. Integrity is violated when a message is actively modified in transit. Information security systems typically provide message integrity in addition to data confidentiality.
  • 5.  For any information system to serve its purpose, the information must be available when it is needed. This means that the computing systems used to store and process the information, the security controls used to protect it, and the communication channels used to access it must be functioning correctly. High availability systems aim to remain available at all times, preventing service disruptions due to power outages, hardware failures, and system upgrades. Ensuring availability also involves preventing denial- of-service attacks.
  • 7.  Identification – am I who I say I am when I log in? If I know your router operating system – I know how to hack it and fake the router out  Authentication – same thing – if I can fake it I can make it do my own thing  Accountability – if I can log in as someone else, no one will hold me accountable  Authorization – if I am root, I can do anything I want to do  How long does it take to crack a Cisco Password using IOS 12.0(10)W5(18g)
  • 8. Oh really? Thanks Google and Shodan If I own two routers on the internet What can I do? Where are the limits Can I get caught?
  • 9. And this is why they have formal development and management processes
  • 10.  IATF (Information Assurance Technical Framework)  People  There must be a commitment to the process  Training, Roles and Responsibilities, Policies and Procedures, Commitment, Penalties for violating  Technology  That the organization has the proper technologies in place  Risk Assessment, Patching, Architecture, Validated products in use, Configuration  Operations  Day to Day activities promote effective security  Enforcement, certification and accreditation, key management
  • 12.  System Characterization  Threat Identification  Vulnerability Identification  Control Analysis  Likelihood determination  Impact analysis  Risk determination  Control determination  Results documentation
  • 13.  Risk Assumption  Risk Avoidance  Risk Limitation  Risk Planning  Research and Development  Risk Transference  Supporting, Preventative, Detection and Recovering Controls