SlideShare a Scribd company logo
REVIEW OF INFORMATION
SECURITY CONCEPTS
WHAT IS INFORMATION SECURITY?
• Question: What is information security?
• Information Security (InfoSec)
• Protection of information and its critical elements,
• Including the systems and hardware that use, store, and transmit that
information.
• Topical areas to implement policies and controls:
• Network Security –
• Physical Security –
• Personnel Security –
• Operations Security –
• Communications Security –
GOALS AND PRINCIPLES OF INFORMATION
SECURITY
• Question: What are the critical characteristics of InfoSec?
• Goals of Information Security
• Confidentiality: Ensures only authorized parties can view information
• Policies – Least Privilege
• Integrity: Ensures information not altered
• Preservation
• Reliability
• Availability: Ensures information accessible when needed to authorized parties
• Principles that Govern Information Security
• Authentication: Ensures that the individual is who she claims to be (the authentic or genuine
person) and not an imposter
• Something you have
• Something you are
• Something you know
• Authorization: Providing permission or approval to specific technology resources
• Accounting: Provides tracking of events
CNSS SECURITY MODEL
BALANCING INFORMATION SECURITY AND
ACCESS
• Even with the best efforts of planning and implementation, it is
not possible to achieve perfect information security.
• Balance protection of information and information assets with
the availability of that information to authorized users.
• Compromise
• Risk
• “It’s not a question of if, but when and what” ~Silver
BUSINESS CONTINUITY AND INCIDENT
RESPONSE
• Protect the organization’s ability to function
• Implement Policies and Procedures to ensure operational needs
in case of an attack.
• Policies influence security procedures
• Countermeasures
COMPONENTS OF SECURITY
SECURITY PERIMETER AND DEFENSE IN
DEPTH
• Security perimeter
• Defines the boundary between the outer limit of an organization’s
security and the beginning of the outside network
• Firewalls/Rules
• Perimeter does not protect against internal attacks
• Organization may choose to set up security domains
• Defense in depth
• Layered implementation of security
• Redundancy
• Implementing technology in layers
Review of Information Security Concepts
Review of Information Security Concepts
THREATS TO INFOSEC
THREATS
• Malicious code
• Includes viruses, worms, Trojan horses, and active Web scripts
• Executed with the intent to destroy or steal information
• Polymorphic, multivector worm
• Constantly changes the way it looks
• Uses multiple attack vectors to exploit a variety of vulnerabilities in
commonly used software
• Compromising Passwords
• Cracking, Brute force attack, Dictionary attack
DISTRIBUTED DENIAL-OF-SERVICE (DDOS)
SPOOFING
MAN-IN-THE-MIDDLE
BUFFER OVERFLOW
• Use a VM to open
• http://www.pitt.edu/~is2470pb/Fall02/Final/rb/Buffer.html
• http://www.pitt.edu/~is2470pb/Fall02/Final/sl/Applet1.html
• http://www.pitt.edu/~is2470pb/Fall02/Final/sh/BufferOverFlow/BufferO
verFlow.html
SOCIAL ENGINEERING
• Here are a few questions you should ask yourself:
• Who is contacting me here? (Remember, most contact details can be found
on the Internet!)
• Why is he contacting me?
• Is the way he's contacting me normal for this company?
• Is the information he's requesting sensitive?
• Is there a way to verify that this is indeed this person?
SUMMARY
• Information security
• Protection of information and its critical elements
• Information security is a process, not a goal
• Takes a wide range of professionals to support the information
security program
• Organization must establish a functional and well-designed
information security program
18

More Related Content

PPTX
Basic Security Requirements
DOCX
Information security policy
DOC
Computer Security Policy
PPTX
Introduction to Information Security
PPTX
Information Security Lecture #1 ppt
PPTX
Introduction to information security
PPT
Iss lecture 1
PPTX
System Security-Chapter 1
Basic Security Requirements
Information security policy
Computer Security Policy
Introduction to Information Security
Information Security Lecture #1 ppt
Introduction to information security
Iss lecture 1
System Security-Chapter 1

What's hot (20)

PPTX
презентация1
PPTX
Introduction to Cybersecurity Fundamentals
PPT
Information security and other issues
PPT
Introduction to information security
PPTX
Introduction to Network Security
PPTX
INFORMATION SECURITY SYSTEM
PPTX
Ics & computer security for nuclear facilities
PPTX
Introduction to information security
PDF
Network infrastructure security management solution - A holistic approach in ...
PPT
Security tools
PPTX
Network Security
PPTX
Network security
PPTX
IT Security Presentation
PDF
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
PPTX
Computer security concepts
PPTX
Cyber Security # Lec 3
PPTX
INFORMATION SECURITY
PDF
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
DOC
System Security Threats and Risks)
PPTX
Importance Of A Security Policy
презентация1
Introduction to Cybersecurity Fundamentals
Information security and other issues
Introduction to information security
Introduction to Network Security
INFORMATION SECURITY SYSTEM
Ics & computer security for nuclear facilities
Introduction to information security
Network infrastructure security management solution - A holistic approach in ...
Security tools
Network Security
Network security
IT Security Presentation
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
Computer security concepts
Cyber Security # Lec 3
INFORMATION SECURITY
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
System Security Threats and Risks)
Importance Of A Security Policy
Ad

Viewers also liked (20)

PPTX
Intrusion Prevention Systems
PPT
Introduction To Information Security
PDF
Information Security Intelligence
PPTX
Back to the future - cyber security, privacy and visions of the future
PPT
Information Security Management.Introduction
PPT
IPS Product Comparison of Cisco 4255 & TippingPoint 5000E
PPTX
Log management
DOCX
Skl kelas 6
PDF
Understanding Information Security
PPTX
IT Security Management -- People, Procedures and Tools
PPTX
Journey to iPS Cell our future
PPTX
types of personal computer
PPT
Information Security Management. Security solutions copy
PPTX
Leveraging Compliance for Security with SIEM and Log Management
PPTX
Pentesting Cloud Environment
PPTX
Types of personal computers
PPT
IDS and IPS
PPTX
Information Security Awareness
PDF
Reasonable Security Practices And Procedures And Sensitive Personala 24 06 2...
PDF
Reasonable security practices and procedures and sensitive personal data or i...
Intrusion Prevention Systems
Introduction To Information Security
Information Security Intelligence
Back to the future - cyber security, privacy and visions of the future
Information Security Management.Introduction
IPS Product Comparison of Cisco 4255 & TippingPoint 5000E
Log management
Skl kelas 6
Understanding Information Security
IT Security Management -- People, Procedures and Tools
Journey to iPS Cell our future
types of personal computer
Information Security Management. Security solutions copy
Leveraging Compliance for Security with SIEM and Log Management
Pentesting Cloud Environment
Types of personal computers
IDS and IPS
Information Security Awareness
Reasonable Security Practices And Procedures And Sensitive Personala 24 06 2...
Reasonable security practices and procedures and sensitive personal data or i...
Ad

Similar to Review of Information Security Concepts (20)

PDF
Unit 1&2.pdf
PPTX
Princinples of information security Lecture_1_Information_Security.pptx
PPT
information security management
PPTX
information security
PPT
chapter 1. Introduction to Information Security
PPTX
Security Foundation and Incident Mgmt and BCMS.pptx
PPTX
Introduction-to-Information-Security.pptx
PDF
1. Security and Risk Management
DOCX
Unit 1 Information Security.docx
PPT
Information security
PDF
CNIT 125: Ch 2. Security and Risk Management (Part 1)
PDF
information security introduction for campus students.pdf
PPTX
MIS 7.pptx
DOCX
11What is Security 1.1 Introduction The central role of co.docx
PDF
1. Security and Risk Management
PPT
002.itsecurity bcp v1
PDF
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
PPT
is_1_Introduction to Information Security
PPTX
ISM-CS5750-01.pptx
PPTX
Information Security : Is it an Art or a Science
Unit 1&2.pdf
Princinples of information security Lecture_1_Information_Security.pptx
information security management
information security
chapter 1. Introduction to Information Security
Security Foundation and Incident Mgmt and BCMS.pptx
Introduction-to-Information-Security.pptx
1. Security and Risk Management
Unit 1 Information Security.docx
Information security
CNIT 125: Ch 2. Security and Risk Management (Part 1)
information security introduction for campus students.pdf
MIS 7.pptx
11What is Security 1.1 Introduction The central role of co.docx
1. Security and Risk Management
002.itsecurity bcp v1
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
is_1_Introduction to Information Security
ISM-CS5750-01.pptx
Information Security : Is it an Art or a Science

More from primeteacher32 (20)

PPT
Software Development Life Cycle
PPTX
Variable Scope
PPTX
Returning Data
PPTX
Intro to Functions
PPTX
Introduction to GUIs with guizero
PPTX
Function Parameters
PPTX
Nested Loops
PPT
Conditional Loops
PPTX
Introduction to Repetition Structures
PPTX
Input Validation
PPTX
Windows File Systems
PPTX
Nesting Conditionals
PPTX
Conditionals
PPT
Intro to Python with GPIO
PPTX
Variables and Statements
PPTX
Variables and User Input
PPT
Intro to Python
PPTX
Raspberry Pi
PPT
Hardware vs. Software Presentations
PPTX
Block chain security
Software Development Life Cycle
Variable Scope
Returning Data
Intro to Functions
Introduction to GUIs with guizero
Function Parameters
Nested Loops
Conditional Loops
Introduction to Repetition Structures
Input Validation
Windows File Systems
Nesting Conditionals
Conditionals
Intro to Python with GPIO
Variables and Statements
Variables and User Input
Intro to Python
Raspberry Pi
Hardware vs. Software Presentations
Block chain security

Recently uploaded (20)

PPTX
Overview Planner of Soft Skills in a single ppt
PPTX
430838499-Anaesthesiiiia-Equipmenooot.pptx
PDF
Blue-Modern-Elegant-Presentation (1).pdf
PPTX
Principles of Inheritance and variation class 12.pptx
PPT
notes_Lecture2 23l3j2 dfjl dfdlkj d 2.ppt
PPTX
employee on boarding for jobs for freshers try it
PPTX
The Stock at arrangement the stock and product.pptx
PPTX
microtomy kkk. presenting to cryst in gl
PDF
Shopify Store Management_ Complete Guide to E-commerce Success.pdf
PDF
CV of Architect Professor A F M Mohiuddin Akhand.pdf
PPT
pwm ppt .pdf long description of pwm....
PDF
Women’s Talk Session 1- Talking about women
PPTX
Condensed_Food_Science_Lecture1_Precised.pptx
PPTX
ChandigarhUniversityinformationcareer.pptx
PDF
APNCET2025RESULT Result Result 2025 2025
PDF
MCQ Practice CBT OL Official Language 1.pptx.pdf
PDF
Beyond the Lab Coat - Perjalanan Karier di Dunia Pasca-Fisika S1
PDF
LSR CASEBOOK 2024-25.pdf. very nice casbook
PPTX
STS CHAP 4 human development as reflected
PPTX
AREAS OF SPECIALIZATION AND CAREER OPPORTUNITIES FOR COMMUNICATORS AND JOURNA...
Overview Planner of Soft Skills in a single ppt
430838499-Anaesthesiiiia-Equipmenooot.pptx
Blue-Modern-Elegant-Presentation (1).pdf
Principles of Inheritance and variation class 12.pptx
notes_Lecture2 23l3j2 dfjl dfdlkj d 2.ppt
employee on boarding for jobs for freshers try it
The Stock at arrangement the stock and product.pptx
microtomy kkk. presenting to cryst in gl
Shopify Store Management_ Complete Guide to E-commerce Success.pdf
CV of Architect Professor A F M Mohiuddin Akhand.pdf
pwm ppt .pdf long description of pwm....
Women’s Talk Session 1- Talking about women
Condensed_Food_Science_Lecture1_Precised.pptx
ChandigarhUniversityinformationcareer.pptx
APNCET2025RESULT Result Result 2025 2025
MCQ Practice CBT OL Official Language 1.pptx.pdf
Beyond the Lab Coat - Perjalanan Karier di Dunia Pasca-Fisika S1
LSR CASEBOOK 2024-25.pdf. very nice casbook
STS CHAP 4 human development as reflected
AREAS OF SPECIALIZATION AND CAREER OPPORTUNITIES FOR COMMUNICATORS AND JOURNA...

Review of Information Security Concepts

  • 2. WHAT IS INFORMATION SECURITY? • Question: What is information security? • Information Security (InfoSec) • Protection of information and its critical elements, • Including the systems and hardware that use, store, and transmit that information. • Topical areas to implement policies and controls: • Network Security – • Physical Security – • Personnel Security – • Operations Security – • Communications Security –
  • 3. GOALS AND PRINCIPLES OF INFORMATION SECURITY • Question: What are the critical characteristics of InfoSec? • Goals of Information Security • Confidentiality: Ensures only authorized parties can view information • Policies – Least Privilege • Integrity: Ensures information not altered • Preservation • Reliability • Availability: Ensures information accessible when needed to authorized parties • Principles that Govern Information Security • Authentication: Ensures that the individual is who she claims to be (the authentic or genuine person) and not an imposter • Something you have • Something you are • Something you know • Authorization: Providing permission or approval to specific technology resources • Accounting: Provides tracking of events
  • 5. BALANCING INFORMATION SECURITY AND ACCESS • Even with the best efforts of planning and implementation, it is not possible to achieve perfect information security. • Balance protection of information and information assets with the availability of that information to authorized users. • Compromise • Risk • “It’s not a question of if, but when and what” ~Silver
  • 6. BUSINESS CONTINUITY AND INCIDENT RESPONSE • Protect the organization’s ability to function • Implement Policies and Procedures to ensure operational needs in case of an attack. • Policies influence security procedures • Countermeasures
  • 8. SECURITY PERIMETER AND DEFENSE IN DEPTH • Security perimeter • Defines the boundary between the outer limit of an organization’s security and the beginning of the outside network • Firewalls/Rules • Perimeter does not protect against internal attacks • Organization may choose to set up security domains • Defense in depth • Layered implementation of security • Redundancy • Implementing technology in layers
  • 12. THREATS • Malicious code • Includes viruses, worms, Trojan horses, and active Web scripts • Executed with the intent to destroy or steal information • Polymorphic, multivector worm • Constantly changes the way it looks • Uses multiple attack vectors to exploit a variety of vulnerabilities in commonly used software • Compromising Passwords • Cracking, Brute force attack, Dictionary attack
  • 16. BUFFER OVERFLOW • Use a VM to open • http://www.pitt.edu/~is2470pb/Fall02/Final/rb/Buffer.html • http://www.pitt.edu/~is2470pb/Fall02/Final/sl/Applet1.html • http://www.pitt.edu/~is2470pb/Fall02/Final/sh/BufferOverFlow/BufferO verFlow.html
  • 17. SOCIAL ENGINEERING • Here are a few questions you should ask yourself: • Who is contacting me here? (Remember, most contact details can be found on the Internet!) • Why is he contacting me? • Is the way he's contacting me normal for this company? • Is the information he's requesting sensitive? • Is there a way to verify that this is indeed this person?
  • 18. SUMMARY • Information security • Protection of information and its critical elements • Information security is a process, not a goal • Takes a wide range of professionals to support the information security program • Organization must establish a functional and well-designed information security program 18

Editor's Notes

  • #4: Goals of Information Security Confidentiality: Ensures only authorized parties can view information Policies – Least Privilege Integrity: Ensures information not altered Preservation Reliability Availability: Ensures information accessible when needed to authorized parties Principles that Govern Information Security Authentication: Ensures that the individual is who she claims to be (the authentic or genuine person) and not an imposter Something you have Something you are Something you know Authorization: Providing permission or approval to specific technology resources Accounting: Provides tracking of events
  • #5: Desired goals Confidentiality: assurance that sensitive information is not intentionally or accidentally disclosed to unauthorized individuals. Integrity: assurance that information is not intentionally or accidentally modified in such a way as to call into question its reliability. Availability: ensuring that authorized individuals have both timely and reliable access to data and other resources when needed. Information states Storage: Data at rest (DAR) in an information system, such as that stored in memory or on a magnetic tape or disk. Transmission: transferring data between information systems - also known as data in transit (DIT). Processing: performing operations on data in order to achieve a desired objective. Safeguards Policy and practices: administrative controls, such as management directives, that provide a foundation for how information assurance is to be implemented within an organization. (examples: acceptable use policies or incident response procedures) - also referred to as operations. Education: ensuring that the users of information systems are aware of their roles and responsibilities regarding the protection of information systems and are capable of following standards. (example: end-user training on avoiding computer virus infections or recognizing social engineering tactics) - also referred to as personnel Technology: software and hardware-based solutions designed to protect information systems (examples: anti-virus, firewalls, intrusion detection systems, etc.) Scenarios: Encryption of credit cards over the wire Who has access to FERPA information Telework – Central Authentication Data has not been tampered with
  • #14: Denial-of-service (DoS) attack Attacker sends a large number of connection or information requests to a target So many requests are made that the target system cannot handle them along with other, legitimate requests for service Distributed denial-of-service (DDoS) Coordinated stream of requests against a target from many locations at the same time Any system connected to the Internet is a potential target for denial-of-service attacks
  • #15: Intruder sends messages to IP addresses that indicate to the recipient that the messages are coming from a trusted host
  • #16: Attacker monitors (or sniffs) packets from the network Modifies them using IP spoofing techniques Inserts them back into the network Allows the attacker to eavesdrop, change, delete, reroute, add, forge, or divert data
  • #17: Occurs when more data is sent to a buffer than it can handle Attacker can make the target system execute instructions Attacker can take advantage of some other unintended consequence of the failure
  • #18: Process of using social skills to convince people to reveal access credentials or other valuable information to the attacker “People are the weakest link. You can have the best technology, [then] somebody call[s] an unsuspecting employee. That’s all she wrote, baby. They got everything” Kevin Mitnick