0 ratings 0% found this document useful (0 votes) 40 views 11 pages Information Security Chapter 1
The document provides an introduction to information security, emphasizing the importance of protecting information as a critical business asset. It outlines the components of information, the need for classification based on sensitivity, and the three pillars of information security: confidentiality, integrity, and availability (CIA). Additionally, it discusses various security measures and the significance of data obfuscation in safeguarding sensitive information.
AI-enhanced title and description
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here .
Available Formats
Download as PDF or read online on Scribd
Go to previous items Go to next items
Save Information Security chapter 1 For Later Introduction to
Information Security
| Syllabus ;
Information, Ni
classification,
Security, ne
security,
Three pillars of
classification,
leed and Importanc of Information, information
Criteria for informatign Classification,
ed of security, B; me inches of information
information ecurity, data Obfuscation, event
14
Information
12 Security
1.3 _ Information Securitya x
44_Information ST
Information is a resource fundamental to the succes
ofany business ‘
Information is a combination of following three parts
(1) Data : It is a collection of all types of informatiog
which can be stored and used as per requirement
for example - personal data, medical informatioy
accounting data etc.
(2) Knowledge : It is based on data that is
organized, synthesized or summarized and it is
carried by experienced employees in the
organization.
(@) Action : Tt is used to pass the required
information to a person who needs it with the
help of information system.
Information is a important asset and need to. be
protected all the time.
Need and Importance of Information :
‘Today's world is ‘Information Age’, becauso of use of
computer and communication technology. Computers
lay to check mails, bank
are very essential tod
transactions ete. ;
fo, we need a system that manage and server the
nformation/data to people when they need it
eformation ia a He blood of every OTERSAaRES
saree damage to snformetionldaln A case
‘Truptions in a normal process of organization like
financial loss ete. =
a
tnformaton Seeurty(USETE) 1.3 jaro to tortion Secu
‘Ao information sf
5 System includes hardware, ae
deta, and spoliation ecto manage iformation
formation is on of the most valuable resources of 82
organization so its =
ee ee making
Fig. 14.1 Loformatio System within Organization
‘The main objective of an information system is to
‘monitor and document the operations of other systems.
‘An organization requires information system strategic
plan to:
fo. Discover the area where information technology
‘can be used
‘Communicate to management about need and
concern of use of
© Reduce the IT expenses
© Use of IT applications in st
organization to improve the services
Ensure integration and phe” WE
= implementation of IT efforts
‘a key component of
rategic area of the
‘Today, Information technology is ReY ME
competitive strategy. Hence ay ee and
organization should tightly ink their information
communication flow requirements, -
1-4 Into, to information Secu
Bi crnaten Soest WSSTEL
the decision making capability, the
{(S) should be call for intensivy
etween different units in the
. To satisfy
Ioformation System
‘and comples interaction
organization.
4.12. Information Classification :
«Generally organizations will classify their information
0 provide information security
se ain razon for dassifying information is thot a
data or information of organization will not have the
same level of criticality. Some information or data may
bbe important for some people in organization like
senior management for strategie decisions.
+ Some data like formulae, secrete of trade, product
information ete. are important because loss of such
information will harm the organization in many ways
like organization's goodwill, market ete. Hence,
classification of information will be beneficial for
‘organization to decide level of security.
+ The main aim of the organization is to improve
Confidentiality, Integrity and Availability (CIA) of
‘information and to reduce the risk related to
information.
+ Information classification is important component
while securing any trusted system like government
sectors. In such areas, information classification is
very critical and it is used to prevent unauthorized
‘access to the aystem and achieve confidentiality,
Another reason of classification may be because of
Privacy lawa and legislations or any other compliance.
gop PICO
ent
9 gone ;
nlomaton Securty SBE) 5.5 ot ntrmaton Seu
+ Classification of information and information assets
will help organization to employ security policies and
security procedures for protection of information and
assets that are more critical
+ Advantages of information classification are 8
follows
© Information classification is a commitment to the
organization for security protection.
© Information classification will help organization
to identify which information is eritieal and more
sensitive,
© Information classification supports. CIA -
Confidentiality, Integrity and Availability.
© Information classification will help organization
to decide what type of protection is applied to
which type of information,
© Information classification will fulfill the legal
requirement to legal mandates, compliance and
regulations.
* In organization classification should be based on
sensitivity of information towards its loss and
disclosure. Its job of information owner to define level
of sensitivity of the information. This will help to
Properly implement security controls based on
classification of information.
1.1.3 Criteria for Information Classification :
‘The information classification defines’ what kind.
information is stored on a system? Based on
classification, the information may need i
Protections in place.Eh ration ses USETE)_1-6_ nto formation See
Levels of Information classifications used i,
Government or Military are as follows
(1) Unclassified : Information is not classified as well ay
not sensitive. Information access is public and will no
affect confidentiality. ‘The information is low-impact,
and hence it does not require any security.
@) Sensitivity but unclassified : Information is les,
sensitive and if gets disclosed then it will not create
serious damage to the organization.
(3) Confidential : The unauthorized access to confidential
information will cause damage or be prejudicial ty
national security. This label is used for information
which are labeled between Sensitive but Unclassified
(SBU) and Secrete. Hee pau
(4) Secret : Secret label should be applied to the
information where the unauthorized disclosure of such
information could cause serious damage to the national
security.
(5) TopSecret : Top Secret shall be applied to information
where the unauthorized disclosure of this type of
information could cause exceptionally grave damage to
‘the national
‘security. This is the highest level of
dassification,
Information Secutty (acerey 1-7 ___ Intro. to Information Secu
impact on organization,
2) Sensitive : This
of classification ¢
information ne
integrity.
(3) Private:
'ype of information needs higher level
than normal information. Such type of
ds security for confidentiality as well a
is type of information is personal in nature
and used by company only. The disclosure of such
information can affect company and its employees for
example - medical information, salary information ete.
Following are the criteria used to decide classification
ofinformation percheo'
(1) Value“ It is the common criteria of information
classification. When the information is more valuable
for organization then that information should be
classified, — \jr— prereck
@) Age :"Age states that the classification of information
might be lowered if the information's value decreases
over time. For example - ifthe documents are classified
and then they are automatically declassified after
specific time period.
@) Useful Life : Useful Life states that if the information
has been made out-of-date due to new information or
any other reasons then that information can regularly
be declassified.
(Personal Association : The information which is
personally associated with particular individuals or it
is addressed by a privacy law then such information
should be classified.
ame Brrvomaton secu SBTE) 18 te to Information secunty
1.2__ Security
Security is the method which makes the accessibility of
information or system more reliable.
Security means to protect information or system from
unauthorized users like attackers, who do harm to
system or to network intentionally or unintentionally.
Security is not only to protect system or network, but
also allows authorized users to access the system or
network.
For protecting any organizations, following multi-
layers of securities aré important
o Physical Security : It will protect physical
jtems/assets like Hard disk, RAM, objects or
areas from unauthorized users.
Perséral’ Security -:* It will protect the
jual users or groups in the organization
indivi
who are authorized to use operations and
organization.
© Operational Security : It will protect details of
particular operations/series of activities in the
organization.
o Communication Security : It will protect
communication technology, media and content of
communication.
0 Network Security : It will protect networking
components like router, bridges, connections and
contents etc.
Information Security : It will protect all
informational assets. It contains management
cement vars +9
Into. to nformation Security
information sec
Security, computer
and network security, puter and data security
Managoment of
Information secuty
Organization should implement tools like policy,
training and education to provide security to
information and its system.
1 Need of Security :
‘Now a day Information security is the emenging field
because of wide use of computers in day to day life.
Information security is not only related to computer
system or information but it should apply to all aspects
of safeguarding or protecting information or data in
any form or media.
It is very much important to protect system or network
from unauthorized access or modifeation like-
rd part of information.
ation or data in
Security means to protection of informs
some form from unauthorized use.infomation Seu
For any organization,
musBTe)__1-10___ Ito. to Information Secu
Information security perform,
{following four important functions
0
2) Enables sat
protect the organization's ability
to function :
of both IT managemen,
‘manage © implement
security protects the
information
organizational ability to func
Information security is a part of management
than technology for example - in payroll system,
it is more job of management than mathematica]
computations.
Policy and its implementation are important in
information security than technology which is
implementing it.
So each organization, who are interested in
implementing information security must address
security in terms of business impact and the cost
of business interruption rather than focusing on
security as a technical problem.
‘operations of applications :
Now days many organization purchase and
operate integrated, efficient and capable,
applications.
‘These applications are very much important for
‘the organizations infrastructure like - email,
‘messaging applications, OS platforms ete.
Hence it is need of an organization to create an
environment that will protect such applications
which are running under organization's IT
system.
®
0
piemsten Ses STE S15 jy, ofan SO
© Such appt or
dovelon nitions can either be purchased
‘Safeguard the technologh
esponsibility gt
department of ano
infrastructure to IT
ganization,
Protects the data collected and used by organization :
entire
Data is the
2 the most important factor of any
Ganization, without it organization loses its
records of transactions, customers ete
Any organization like government, busines!
ites depend on informal
system to support various transactions,
‘The valuable data attract attackers to steal or
‘corrupt the data; hence the protections of data in
motion or at rest are the
information security.
‘Therefore
important for
Management should protect the
integrity and value of organization's data by
implementing effective information
security
Programs.
sets of an organization :
‘To work effectively, an organization should add
secure infrastructure services.
‘Small businesses can use ISP and personal
jon tool for email services whereas large
organizations can use PKI (Public Kay
Infrastructure) which uses digital certificate to
check confidentiality of the transaction.y susove)_112_heolniarmation Sac
:
wniation grows, more robust any "Jn information security, a system can be :
‘ a © A eric er eompment tke mathermad, |
protocol ete
Hence, epi
technologies ams like Firewall.
sce tec nee Fe
ae n Security : © Anoperating eystem
Basie Principles of Information 2 A Communication System
sof informatio, :
: 22 (a) shows the three goals of in : © Organization staf, structure, policies, procedures
ns etc as a collection
- o Internet
© _An Application System. payroll aystem ete.
Phyl Seay
——
) vier VJ
+ sym Secty
a: Security Goal ia Soc
a. {Hardware and Software Security
+ These security goals are key requirement for security
and itis also known as “Pillars of Information
13.1
Security” which we will see in set
Onion skin is the ideal approach for security. It is a
layered security mechanism hence if failure of any of
the security control means the asset is not completely Fig. 1.2.2 (b) : Layered Security
unsecure means ‘efense-inlepth ‘
sa cio earths 1.3 Information Securit
‘Defense-in-depth” is the concept of protecting an ——™wormation Security:
1.3.1 Three Pillars of Information Secut
information assets and system with a series of
defensive mechanisms in such a way that if one i i
mechanism fs another il already e te pleoe nn = Following figure shows the three pillars of Information
rity :
stop an attack.(
14
ig. 1.3.4 Thee Pillars 0
Confident
a Avalaity
information Security (CIA Telad)
Confidentiality :
tis used to ensure that only the individuals why
have the authority can be able to view a piece «
information, Unauthorized individual cannot by
able to view data for which they are not entitled
to. be
It is nothing but the secrecy or cbotciaent w
information and Resources, :
In the sensitive fields like Industry, government
and military there is need to keep information
secret. In this case only the authorized person can
access information or resources
To maintain the confidentiality various
‘mechanisms are used like Resource hiding
cryptography, access control mechanism.
‘Loss of confidentiality is due to intentional
release of company’s private information or bs
misuse of rights by employees.
Integrity :
Integrity is related with the generation and
modification of data. Only the authorized
individuals can be able to create or change (0!
delete) information.
Integrity should ensure
(Boman ss,
SCTE) 1.15 io. inomaton Secu
o Modifie,
Dattion by authorized porson only
donuithorized modification should not be
One by authorized person,
Rats should be consistent internally as wall
be eemtelly. Internal information should
consistent with all sub entities as well as
with external, Situations like real world.
Availablity:
+ ‘This
used to ensure that that the data or the
System is available for use when the authorized
user wants to access it,
It ensures reliable
information by authorix
and timely access of
ed person,
1.3.2 DatalObtuscation (D0) :
Data obfuscation is a method to prevent the intrusion
of private and sensitive datalinformation,
Data obfuscation is related to the encryption of data
and itis the solution to information tho because It
ides orignal information with pandom charactors
Data obfuscation sn form of data masking whore data
in purposely scrambled to prvent unauthorized scons
a.
data/information usage, making it confusing and
harder to interpret.
© The terms Data obfuscation and data encryption are
fundamentally different. Encryption prevents
_ unauthorized users fom understanding the date,
i jed when the ‘data is,
+ Typically, eneryption can be applied
Segoe ja onder to protec “an
ae
he7 riormaton Securty MSBTE) _1-16__Inoto infomation So
‘
encryption can also be applied ‘in transit’, whig,
protects the information from being compromise,
during transmission. However, with encryption
authorized users can still have access to the origing,
data,
In encryption, data cannot be read in their encryptej
format hence it is logically secure because fy
decryption suitable key is required.
Data obfuscation protects individual's data in. non,
production environments by replacing it with
representative but fictitious data.
In the event of a data loss involving obfuscated data,
‘an unauthorized user may be able to read the dat,
“(including field headings), but it will not reflect any
individual's details
Information protection can therefore be provided
through a combination of encryption and date
obfuscation.
‘The private sector users have similar requirements for
‘a data obfuscation service as part of their testing and
support services.
‘The use of personal information in government records,
‘medical records, and voters lists ete. will create a
threat to privacy. Hence many countries are focusing
on safeguards for privacy of personal information.
It is necessary for organizations to understand the risk
and need of data protection in terms of privacy to the
publicized information,
Hence the term data obfuscation is used which
modifies the data items without changing the
usefulness of the data.
Biternaton secur wsare) a7
«Basically there are
extracts from data
the personnel inv
the system needs
production system,
agencies.
«)\- Normally,
(A ike
we
bases. For example, let’s consider
‘stigating system problems, where
'o handle the extracted data from
which is then, send to other
‘here can be following possible situations
ne ine needs for testing where it should
‘and encrypted, or
eam sem hat have legal rights to
q there is only need of data
eneryption.
+ /in any above mentioned cases, only the data which is
required that should be extracted but not the full data
set and extra protection should be provided by data
obfuscation method,
+ Data Obfuscation is a batch activity and it is relatively
simple to achieve but sometimes it is harder for IT
support. staff (Customer Service Representative) to
solve the problem, who can access the sensitive
personal data at the time of diagnosing the system
problems. This is more complex if the personal data is
causing the problem which the support staffs are
trying to solve. Now, here the end-users will always
need support staff with the right permission to search
at live personal data,ary where there
| An higher level of protection is necess
‘on data in non,
je the relation to the usage of product
production environments.
+ Audit Report in medical system, which
/Sxample +
contains sensitive information and it, 8 generated for
auditor is to examine the
external auditor. The job of ‘
seport for information which shows Possiblt
fraud or abuse of information.
rovide pationts personal
Management should not P)
‘less and until he needs it,
information to the auditor unl
sree nformation should be presented in such & Way
tre the examination of information i8 allowed 60 ‘hat
nly patterns of information ean be detected
hen auditor discovers probable case of abuse, he may
weg ene real name and other information of party, In
Tate ease, he ean eontact and ask for the information to
fustomer service representative who supplied the
report.
‘The data that
into an application which gives
customer service representative.
In case of organization, when sensitive inform:
provided to data mining expert, then encryption is not
‘a good solution because data should be provided in
‘ACSII format. Hence the better solution to obfuscate
the data is with a simple substitution cipher technique.
Data Obfuscation techniques can be classified by #
number of eriteri = Fy
© Usefulness : measures how appropriate is the
obfuscated data set for use after it has been
js obfuscated are read and then inputs it
real data by the
ation is
changed,
le ways of
\
information Socurty (sere)
vot
ffectiveness : m Lottematon Soe
and. skill ig | DessUFes how mu
understand, a, mt by
ss Land remo?
construct, remove, the
ich time, effort
attacker to
obfuscation
the resources
the mourn the unebantr na
ising the resiliency will hen ee
automated unobfuseation of dig, PRY
Cost : measures the i 7
Cont: mensrs 2 ipa pomsting th
Bevious two abeds ia easeion of the
Uetloment ting pan mts tht
esuse“hage ema” wage or ee len
ime to create ebascated data
said to have a large cost. s
ication :
4.3.3 Event Clas:
Following are the classifications
Whigs tne Information Seay ST
+ Disaster : It is any event that can cause a significant
disruption in operational and/or computer processing
capabill cl
operations of the business. Te causes permanent and
considerable harm to the assets of an organization like
hardware, information, property, staf, services ee.
consequence of some event
potential risk, In erses, deci
nt__or__as__an__unfor
that had been considered 2
isions be made quickly toSecurit
information Security (MSBTE) 1-20 Intro. to Information y
limit damage to the organization and if not handled
carefully then it becomes disaster.
* Catastrophe : It is an extremely large-scale disaster
and dangerous Situation like major troubles resulting
from the damage of critical equipment in processing.
or cage three pillars of information security. ~
a Explain why Information System is important.
Q3 Define term Information and Security.
\o Describe term Data Obfuscation. ,
~ O56 Define following terms - disaster, crisis, catastrophe,
. LE What is security? Explain different types of securities,
~ 2. Explain different criteria’s used for
information.
_ oe Explain different levels used in classification of information
oe Explain need of security in detail.
Classification of
Qua