InfoSec-Lect-01-Basics
InfoSec-Lect-01-Basics
Science Faculty
IT Department
Information Security
Lecture 01: Basics of Information Security
2nd Resource
– Computer & Internet Security: A Hands-on Approach,
Second Edition
– By Wenliang (Kevin) Du
Course Topics
– Lecture 01 Basics of Information Security
– Lecture 02 Types of Attacks
– Lecture 03 Firewalls
– Lecture 04 VPN (Virtual Private Networks)
– Lecture 05 PKI (Public Key Infrastructure)
– Lecture 06 IPS/IDS (Intrusion Prevention/Detection Systems)
– Lecture 07 AntiMalware
LAB Sessions
– LAB 01 Information Security LAB Setup
– LAB 02 TCP Attacks
– LAB 03 Firewall Policy
– LAB 04 Site-to-Site VPN Setup
– LAB 05 PKI (Public Key Infrastructure)
– LAB 06 IDS Example
– LAB 07 AntiMalware
Lecture 1
Basics of Information Security
Lecture Topics
1.1 Definition
1.2 Information Security Architecture
1.3 Security Services Categories
1.4 Passive Vs. Active Security Attacks
1.5 Security Attack By Effect
1.6 Security Attack Diagrams
1.7 Attack vs. Service Matrix
1.8 Main Security Mechanisms
1.9 Model for Firewall
1.10 Model for Cryptography
1.11 Steps to Handle Security Risks
1.12 Cybersecurity Framework Diagram
1.1 Definition
• Information Security is the protection of information and its
critical elements, including systems and hardware that use, store,
and transmit that information.
• Vulnerability: a weakness that makes targets susceptible to an
attack.
• Threat: is a possible danger that might exploit a vulnerability.
1.2 Information Security Architecture
• Security Service
– A processing or communication service that enhances
the security of the data processing systems and the
information transfers of an organization
• Security Attack
– Any action that compromises the security of information
owned by an organization
• Security Mechanism
– A process or a device that is designed to detect, prevent,
or recover from a security attack.
•
1.11 Steps to Handle Security Risks
1. Identify: The first step in cyber-security strategy is to
understand your resources and risks.
2. Protect: Deploy security protection mechanisms .
3. Detect: If an attack occurs, you’ll want mechanisms
in place that will alert you as quickly as possible.
4. Respond: If a cybersecurity breach happens, you’ll
want to contain and reduce any damage.
5. Recover: After a cybersecurity breach, you’ll need
mechanisms in place to help resume normal
operations.
1.12 Cybersecurity Framework Diagram