0% found this document useful (0 votes)
52 views35 pages

Information Security Chapter 2

The document discusses information security and the need for security. It defines key terms like data, information, and information assets. It also outlines 12 general categories of threats to information security, including compromises to intellectual property, software attacks, espionage or trespass, forces of nature, human error or failure, and information extortion.

Uploaded by

Abdirizak Abokar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views35 pages

Information Security Chapter 2

The document discusses information security and the need for security. It defines key terms like data, information, and information assets. It also outlines 12 general categories of threats to information security, including compromises to intellectual property, software attacks, espionage or trespass, forces of nature, human error or failure, and information extortion.

Uploaded by

Abdirizak Abokar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 35

Information Security

Chapter #2

The Need for Security


Introduction
• Data: Items of fact collected by an organization. Data includes raw
numbers, facts, and words. Student quiz scores are a simple example
of data.

• Information: Data that has been organized, structured, and


presented to provide additional insight into its context, worth, and
usefulness. For example, a student’s class average can be
presented in the context of its value, as in “90 = A.”
Introduction

• Information asset: The focus of information security;


information that has value to the organization, and the
systems that store, process, and transmit the information.

• The security of Information + its Systems


Business Needs First
• Data security: Commonly used as a surrogate for information
security, data security is the focus of protecting data or information
in its various states—at rest (in storage), in processing, and in
transmission (over networks).

• Database security: A subset of information security that focuses on


the assessment and protection of information stored in data
repositories like database management systems and storage media
Information security performs four important
functions for an organization:

• Protecting the organization’s ability to function

• Protecting the data and information the organization collects and


uses

• Enabling the safe operation of applications running on the


organization’s IT systems.

• Safeguarding the organization’s technology assets


Information security functionalities
• Protecting Functionality: General management, IT management, and
information security management are each responsible for facilitating
the information security program that protects the organization’s
ability to function.

• Protecting Data That Organizations Collect and Use: Without data,


an organization loses its record of transactions and its ability to deliver
value to customers.
Information security functionalities

• Enabling the Safe Operation of Applications: Today’s organizations


are under immense pressure to acquire and operate integrated, efficient,
and capable applications.

• Safeguarding Technology Assets in Organizations: To perform


effectively, organizations must employ secure infrastructure hardware
appropriate to the size and scope of the enterprise such as IDs, IPs and
VPNs.
Threats and Attacks
Threats and Attacks

12 general categories of threats that represent a clear and present


danger to an organization’s people, information, and systems.

Each organization must prioritize the threats it faces based on the


particular security situation in which it operates, its organizational
strategy regarding risk, and the exposure levels of its assets.
Threats and Attacks
Compromises to Intellectual Property:

Intellectual Property (IP) The creation, ownership, and control of


original ideas as well as the representation of those ideas.

• IP is protected by copyright law and other laws and use of some IP


may require specific payments.

• The unauthorized appropriation of IP constitutes a threat to


information security.
Threats and Attacks

Software piracy: The unauthorized duplication, installation, or


distribution of copyrighted computer software, which is a violation of
intellectual property.

• The most common IP breach is the unlawful use or duplication of


software-based intellectual property, more commonly known as
software piracy.
Threats and Attacks

Deviations in Quality of Service:

An organization’s information system depends on the successful


operation of many interdependent support systems, including power
grids, data and telecommunications networks and service vendors.

Availability disruption: An interruption in service, usually from a


service provider, which causes an adverse event within an organization.
Deviations in Quality of Service:

Definitions:

Availability disruption: An interruption in service, usually from a service provider,


which causes an adverse event within an organization.

Downtime: The percentage of time a particular service is not available; the opposite
of uptime.

Uptime: The percentage of time a particular service is available; the opposite of


downtime.

Service level agreement (SLA): A document or part of a document that specifies the
expected level of service from a service provider.
Threats and Attacks

Deviations in Quality of Service:

Internet Service Issues:


In organizations that rely heavily on the Internet to support
continued operations, ISP failures can considerably undermine
the availability of information.
Deviations in Quality of Service:
Availability disruption | Internet Service Issues:

• When an organization places its Web servers in the care of a Web hosting
provider, that provider assumes responsibility for all Internet services and
for the hardware and operating system software used to operate the Web site.
These Web hosting services are usually arranged with a service level
agreement (SLA). When a service provider fails to meet the terms of the
SLA, the provider may accrue fines to cover losses incurred by the client.
Threats and Attacks
Threats and Attacks

To be continued
Threats and Attacks
Threats and Attacks | Espionage
Espionage or Trespass:

• Espionage or trespass is a well-known and broad category of electronic and


human activities that can breach the confidentiality of information.

• When an unauthorized person gains access to information an organization


is trying to protect, the act is categorized as espionage or trespass.

• Attackers can use many different methods to access the information stored
in an information system.
Threats and Attacks | Espionage

Espionage or Trespass:

• Competitive Intelligence: The collection and analysis of information


about an organization’s business competitors through legal and ethical
means to gain business intelligence and competitive advantage.
Threats and Attacks | Espionage
Espionage or Trespass:

• Industrial Espionage: The collection and analysis of information


about an organization’s business competitors, often through illegal or
unethical means, to gain an unfair competitive advantage. Also
known as corporate spying

• Trespass: Unauthorized entry into the real or virtual property of


another party.
Threats and Attacks | Espionage

Espionage or Trespass:

Shoulder surfing: The


direct, covert observation
of individual information
or system use.
Threats and Attacks | Espionage
The classic perpetrator of espionage or trespass is the hacker

Hacker Skills and Abilities:

Expert hacker: A hacker who uses extensive knowledge of the inner


workings of computer hardware and software to gain unauthorized
access to systems and information.
Hacker: A person who accesses systems and information without
authorization and often illegally.
Threats and Attacks | Espionage
Hacker Skills and Abilities:

• Novice hacker: A relatively unskilled hacker who uses the work of


expert hackers to perform attacks. Also known as a neophyte, n00b, or
newbie.

• Penetration tester: An information security professional with


authorization to attempt to gain system access in an effort to identify and
recommend resolutions for vulnerabilities in those systems.
Threats and Attacks | Espionage
Hacker Skills and Abilities:

• Professional hacker: A hacker who conducts attacks for personal


financial benefit or for a crime organization or foreign government.

• Cracker: A hacker who intentionally removes or bypasses software


copyright protection designed to prevent unauthorized duplication or
use.
Threats and Attacks | Espionage
Hacker Skills and Abilities:

Password Attacks:

• Password rule or Policy: An industry recommendation for password


structure and strength that specifies passwords should be at least 10
characters long and contain at least one uppercase letter, one lowercase
letter, one number, and one special character.
Threats and Attacks | Espionage
• Brute force password attack: An attempt to guess a password by
attempting every possible combination of characters and numbers in
it.

• Dictionary password attack: A variation of the brute force password


attack that attempts to narrow the range of possible passwords guessed
by using a list of common passwords and possibly including attempts
based on the target’s personal information.
Threats and Attacks | Forces of Nature
Forces of Nature:

• Forces of nature, sometimes called acts of God, can present some of


the most dangerous threats because they usually occur with little
warning and are beyond the control of people.

• These threats, which include events such as fires, floods, earthquakes


and volcanic eruptions , can disrupt not only people’s lives but the
storage, transmission, and use of information.
Threats and Attacks | Forces of Nature

• Organizations must implement controls to limit damage and prepare


contingency plans for continued operations, such as disaster recovery
plans, business continuity plans, and incident response plans. These
threats and plans are discussed in detail in Chapter 5, “Planning for
Security.” Protection mechanisms are discussed in additional detail in
Chapter 9, “Physical Security.”
Threats and Attacks | Human Error or Failure
Category of threat Examples
Compromise to intellectual property Privacy, copyright infringement

Software attacks Viruses, worms, macros, denial of


service
Espionage or trespass Unauthorized access and/or data
collection
Forces of nature Fire, flood, earthquake, lightning
Human error or failure Accidents, employee mistakes
Information extortion Blackmail, information disclosure
Sabotage Destruction of system or Information

Software attacks Viruses, worms, trojan horses, etc.


Threats and Attacks | Theft

Definition:

Theft: The illegal taking of another’s property, which can be physical,


electronic, or intellectual.

• The threat of theft is a constant. The value of information is


diminished when it is copied without the owner’s knowledge.
Threats and Attacks | Theft

• Physical theft can be controlled easily using a wide variety of measures,


from locked doors to trained security personnel and the installation of alarm
systems.

• Electronic theft, however, is a more complex problem to manage and


control. When someone steals a physical object, the loss is easily detected;
if it has any importance at all, its absence is noted. When electronic
information is stolen, the crime is not always readily apparent.
Chapter Recap

• The Need for Security

• Data vs Information

• Four Functions of InfoSec for an organizations

• Threats and attacks


End chapter two

You might also like