Title: Introduction to Information Security
1Introduction to Information Security
South University IT Track
Rolando Rueda de León, Ph.D.
2Objectives
- Administrative Tasks
- Course Requirements/Syllabus/Structure
- IT Organization / Current State
- Introduction to Information Security and The Need
for Security - Case Assignment
Do not figure on opponents not attacking worry
about your own lack of preparation. -- Book of
the Five Rings
3Course Requirements/Syllabus/Structure
- Course Objectives Upon completion of the course,
the student will be able to - Delineate technical and managerial aspects of
security for Information Technology - Identify security weaknesses in hardware and
software - Identify available security tools
- Discuss cryptography and its applications in IT
- Discuss software development methodology and
security related issues - Identify and prioritize threats to information
assets - Define an information security strategy and
architecture - Plan for and respond to intruders in an
information system - Describe legal and public relations implications
of security and privacy issues
4Course Requirements/Syllabus/Structure
- Textbook
- Principles of Information Security, by Michael
Whitman and Herbert Mattord - ISBN 0-619-06318-1, 2003
- Methods of instruction
- Course material will be presented in
lecture/discussion format - Structured research exercises and discussions
- Presentations will rely on cognitive methods to
illustrate course material - Outside materials and multimedia aids will be
utilized as necessary
5Course Requirements/Syllabus/Structure
6Course Requirements/Syllabus/Structure
- Instructor Expectations
- Homework. Read chapters prior to class
- Expect 2-3 hours outside classroom activities
Reading and researching - Participate. Ask questions. Contribute.
Actively participate in the exercises. - Consider the classroom to be a mental gymnasium
where its ok to run, fall, and get up again - Youll benefit much more by participating in the
game than sitting on the sidelines - Take notes. Why let any idea get away? Taking
notes will help you concentrate and organize your
thoughts - Enjoy yourself. Start relaxed and youll leave
refreshed, inspired, and recharged - Forget about whats happening at home or at work.
This is your time. - Get all you can out of this course and have a
good time - Excessive late assignment policy
- Students, who are constantly late, will be
penalized with a 10 reduction from the grade
assigned
7Course Requirements/Syllabus/Structure
- Refer to the syllabus for details regarding
- Academic dishonesty
- Attendance
- Special needs
- Classroom Common Sense Guidelines
8Course Requirements/Syllabus/Structure
- Case Assignments (will see how we progress)
9Course Requirements/Syllabus/Structure
- Case Requirements
- Case Composition
- Brief Case statement. Summarize the Case problem
presented in your textbook - State assumptions (if any)
- Elaborate on the Case questions presented
- State/summarize by presenting your conclusions
- Annotate research Case references
- Cases must be typed
- Cover Page Contents
- Name of institution South University
- Course ID ITS3051 Special Topics Principles in
Information Security - Date Format month/day/year i.e. 07/14/03
- Student Name First name, Last name, i.e. Martha
Jones - Assignment number, i.e. Case-1, Case-2, etc.
10IT Organization / Current State
Typical IT Progression
11Chapter One Learning Objectives
- Upon completion of this chapter you should be
able to - Understand what information security is and how
it came to mean what it does today - Comprehend the history of computer security and
how it evolved into information security - Understand the key terms and critical concepts of
information security as presented in the chapter - Outline the phases of the security systems
development life cycle - Understand the role professionals involved in
information security in an organizational
structure
12What Is Information Security?
- Information security in todays enterprise is a
well-informed sense of assurance that the
information risks and controls are in balance.
Jim Anderson, Inovant (2002)
13The History Of Information Security
- Computer security began immediately after the
first mainframes were developed - Groups developing code-breaking computations
during World War II created the first modern
computers - Physical controls were needed to limit access to
authorized personnel to sensitive military
locations - Only rudimentary controls were available to
defend against physical theft, espionage, and
sabotage
14Figure 1-1 The Enigma
15The 1960s
- Department of Defenses Advanced Research Project
Agency (ARPA) began examining the feasibility of
a redundant networked communications - Larry Roberts developed the project from its
inception
16Figure 1-2 - ARPANET
17The 1970s and 80s
- ARPANET grew in popularity as did its potential
for misuse - Fundamental problems with ARPANET security were
identified - No safety procedures for dial-up connections to
the ARPANET - User identification and authorization to the
system were non-existent - In the late 1970s the microprocessor expanded
computing capabilities and security threats
18R-609 The Start of the Study of Computer
Security
- Information Security began with Rand Corporation
Report R-609 - The scope of computer security grew from physical
security to include - Safety of the data
- Limiting unauthorized access to that data
- Involvement of personnel from multiple levels of
the organization
19The 1990s
- Networks of computers became more common, so too
did the need to interconnect the networks - Resulted in the Internet, the first manifestation
of a global network of networks - In early Internet deployments, security was
treated as a low priority
20The Present
- The Internet has brought millions of computer
networks into communication with each other
many of them unsecured - Ability to secure each now influenced by the
security on every computer to which it is
connected
21What Is Security?
- The quality or state of being secure--to be free
from danger - To be protected from adversaries
- A successful organization should have multiple
layers of security in place - Physical security
- Personal security
- Operations security
- Communications security
- Network security
22What Is Information Security?
- The protection of information and its critical
elements, including the systems and hardware that
use, store, and transmit that information - Tools, such as policy, awareness, training,
education, and technology are necessary - The C.I.A. triangle was the standard based on
confidentiality, integrity, and availability - The C.I.A. triangle has expanded into a list of
critical characteristics of information
23Critical Characteristics Of Information
- The value of information comes from the
characteristics it possesses. - Availability
- Accuracy
- Authenticity
- Confidentiality
- Integrity
- Utility
- Possession
24Figure 1-3 NSTISSC Security Model
25Components of an Information System
- To fully understand the importance of information
security, you need to know the elements of an
information system - An Information System (IS) is much more than
computer hardware it is the entire set of
software, hardware, data, people, and procedures
necessary to use information as a resource in the
organization
26Securing the Components
- The computer can be either or both the subject of
an attack and/or the object of an attack - When a computer is
- the subject of an attack, it is used as an active
tool to conduct the attack - the object of an attack, it is the entity being
attacked
27Figure 1-5 Subject and Object of Attack
28Balancing Security and Access
- It is impossible to obtain perfect security - it
is not an absolute it is a process - Security should be considered a balance between
protection and availability - To achieve balance, the level of security must
allow reasonable access, yet protect against
threats
29Figure 1-6 Balancing Security and Access
30Bottom Up Approach
- Security from a grass-roots effort - systems
administrators attempt to improve the security of
their systems - Key advantage - technical expertise of the
individual administrators - Seldom works, as it lacks a number of critical
features - participant support
- organizational staying power
31Figure 1-7 Approaches to Security Implementation
32Top-down Approach
- Initiated by upper management
- issue policy, procedures, and processes
- dictate the goals and expected outcomes of the
project - determine who is accountable for each of the
required actions - This approach has strong upper management
support, a dedicated champion, dedicated funding,
clear planning, and the chance to influence
organizational culture - May also involve a formal development strategy
referred to as a systems development life cycle - Most successful top-down approach
33The Systems Development Life Cycle
- Information security must be managed in a manner
similar to any other major system implemented in
the organization - Using a methodology
- ensures a rigorous process
- avoids missing steps
- The goal is creating a comprehensive security
posture/program
34Figure 1-8 SDLC Waterfall Methodology
35SDLC and the SecSDLC
- The SecSDLC may be
- event-driven - started in response to some
occurrence or - plan-driven - as a result of a carefully
developed implementation strategy - At the end of each phase comes a structured review
36Investigation
- What is the problem the system is being developed
to solve? - The objectives, constraints, and scope of the
project are specified - A preliminary cost/benefit analysis is developed
- A feasibility analysis is performed to assesses
the economic, technical, and behavioral
feasibilities of the process
37Analysis
- Consists primarily of
- assessments of the organization
- the status of current systems
- capability to support the proposed systems
- Analysts begin to determine
- what the new system is expected to do
- how the new system will interact with existing
systems - Ends with the documentation of the findings and a
feasibility analysis update
38Logical Design
- Based on business need, applications are selected
capable of providing needed services - Based on applications needed, data support and
structures capable of providing the needed inputs
are identified - Finally, based on all of the above, select
specific ways to implement the physical solution
are chosen - At the end, another feasibility analysis is
performed
39Physical Design
- Specific technologies are selected to support the
alternatives identified and evaluated in the
logical design - Selected components are evaluated based on a
make-or-buy decision - Entire solution is presented to the end-user
representatives for approval
40Implementation
- Components are ordered, received, assembled, and
tested - Users are trained and documentation created
- Users are then presented with the system for a
performance review and acceptance test
41Maintenance and Change
- Tasks necessary to support and modify the system
for the remainder of its useful life - The life cycle continues until the process begins
again from the investigation phase - When the current system can no longer support the
mission of the organization, a new project is
implemented
42Security Systems Development Life Cycle
- The same phases used in the traditional SDLC
adapted to support the specialized implementation
of a security project - Basic process is identification of threats and
controls to counter them - The SecSDLC is a coherent program rather than a
series of random, seemingly unconnected actions
43Investigation
- Identifies process, outcomes and goals of the
project, and constraints - Begins with a statement of program security
policy - Teams are organized, problems analyzed, and scope
defined, including objectives, and constraints
not covered in the program policy - An organizational feasibility analysis is
performed
44Analysis
- Analysis of existing security policies or
programs, along with documented current threats
and associated controls - Includes an analysis of relevant legal issues
that could impact the design of the security
solution - The risk management task (identifying, assessing,
and evaluating the levels of risk) also begins
45Logical Physical Design
- Creates blueprints for security
- Critical planning and feasibility analyses to
determine whether or not the project should
continue - In physical design, security technology is
evaluated, alternatives generated, and final
design selected - At end of phase, feasibility study determines
readiness so all parties involved have a chance
to approve the project
46Implementation
- The security solutions are acquired (made or
bought), tested, and implemented, and tested
again - Personnel issues are evaluated and specific
training and education programs conducted - Finally, the entire tested package is presented
to upper management for final approval
47Maintenance and Change
- The maintenance and change phase is perhaps most
important, given the high level of ingenuity in
todays threats - The reparation and restoration of information is
a constant duel with an often unseen adversary - As new threats emerge and old threats evolve, the
information security profile of an organization
requires constant adaptation
48Security Professionals and the Organization
- It takes a wide range of professionals to support
a diverse information security program - To develop and execute specific security policies
and procedures, additional administrative support
and technical expertise is required
49Senior Management
- Chief Information Officer
- the senior technology officer
- primarily responsible for advising the senior
executive(s) for strategic planning - Chief Information Security Officer
- responsible for the assessment, management, and
implementation of securing the information in the
organization - may also be referred to as the Manager for
Security, the Security Administrator, or a
similar title
50Security Project Team
- A number of individuals who are experienced in
one or multiple requirements of both the
technical and non-technical areas - The champion
- The team leader
- Security policy developers
- Risk assessment specialists
- Security professionals
- Systems administrators
- End users
51Data Ownership
- Data Owner - responsible for the security and use
of a particular set of information - Data Custodian - responsible for the storage,
maintenance, and protection of the information - Data Users - the end systems users who work with
the information to perform their daily jobs
supporting the mission of the organization
52Communities Of Interest
- Each organization develops and maintains its own
unique culture and values. Within that corporate
culture, there are communities of interest - Information Security Management and Professionals
- Information Technology Management and
Professionals - Organizational Management and Professionals
53Information Security Is It an Art or a Science?
- With the level of complexity in todays
information systems, the implementation of
information security has often been described as
a combination of art and science
54Security as Art
- No hard and fast rules nor are there many
universally accepted complete solutions - No magic users manual for the security of the
entire system - Complex levels of interaction between users,
policy, and technology controls
55Security as Science
- Dealing with technology designed to perform at
high levels of performance - Specific conditions cause virtually all actions
that occur in computer systems - Almost every fault, security hole, and systems
malfunction is a result of the interaction of
specific hardware and software - If the developers had sufficient time, they could
resolve and eliminate these faults
56Security as a Social Science
- Social science examines the behavior of
individuals interacting with systems - Security begins and ends with the people that
interact with the system - End users may be the weakest link in the security
chain - Security administrators can greatly reduce the
levels of risk caused by end users, and create
more acceptable and supportable security profiles
57Questions ?
58Course Structure
- Section II- Security Investigation
- Chapter Two
- Examines the business drivers behind the security
analysis design process - Chapter Three
- Key laws that shape the field of Information
Security - Presents a detail examination of computer ethics
59Course Structure
- Section III Security Analysis
- Chapter Four
- The processes to conduct a fundamental security
assessment - It describing the procedures for identifying and
prioritizing threats - Methods for identifying what controls are in
place to protect these assets from threat - Chapter Five
- Risk analysis
- Presents various types of feasibility analysis
- It addresses quantitative and qualitative
assessment measures - And evaluation of security controls
60Certification Security Professionals
- Section IV Blueprint for Security
- Chapter Six
- A number of widely accepted security models and
frameworks - It examines best business practices and standards
- It presents an overview of the development of
security policy. - Details major components, scope and target
audience - It explains data classification schemes, both
military and private - And security education training and awareness
SETA program - Chapter Seven
- The planning process that supports business
continuity - disaster recovery
- Incident response
- Addresses the organizations role
- When to involve outside law enforcement agencies
- Examines the integration of security into the
traditional systems development life cycle
61Certification Security Professionals
- Section V Physical Design
- Chapter Eight
- Specific security technologies that organization
can select to support security efforts - Firewalls
- Intrusion detection systems
- Honey ports
- Security protocols
- Virtual private networks (VPNs)
- Cryptography
- Chapter Nine
- Management of the physical facilities
- Implementation of physical access control
- Oversight environmental controls
- Special considerations for for physical security
threats
62Certification Security Professionals
- Section VI Implementation
- Chapter Ten examines elements critical to
implementing the design created in the previous
stages - Bulls-eye model for implementing information
security - Discussion of whether an organization should
outsource each component of security - Change management
- Program improvement, and additional planning
- Chapter Eleven addresses Examines both sides of
the personnel coin - security personnel
- security of personnel
- Staffing issues
- Professional security credentials
- The implementation of employment policies and
practices
63Certification Security Professionals
- Section VII Maintenance Change
- Chapter Twelve deals with discussion of
maintenance and change. - Ongoing technical and administrative evaluation
of the security program - Explores ongoing risk analysis, risk evaluation
of the security program - Risk analysis
- Risk evaluation and measurement
- Vulnerability analysis
- Internet penetration
- Testing
- Wireless network risk assessment
64Questions ?
65Case Study Warm-up
- Form a Team
- Read Case Spending on Security
- Brainstorm the issues presented in the case
- Scribble down the team thoughts
- Review and eliminate the undesirable thoughts
- Answer Questions One and Two
- Briefly present your response to both questions