Introduction To Information Security
Introduction To Information Security
Information
Security
Computer Security Concepts
Computer Security -- Definition
The protection afforded to an automated information system in order
to attain the applicable objectives of preserving the integrity,
availability, and confidentiality of information system resources
(includes hardware, software, firmware, information/data, and
telecommunications).
-
NIST
Threat
A potential for violation of security, which exists when there is a
circumstance, capability, action, or event that could breach security and
cause harm. That is, a threat is a possible danger that might exploit a
vulnerability. Eg : Viruses, Malwares, Worms,etc.
Attack
An assault on security that derives from an intelligent threat; that is, an
intelligent act that is a deliberate attempt (especially in the sense of a
method or technique) to evade security services and violate the
security policy of a system.
Types of attack
• Passive Attacks
• Release of message contents
• Traffic analysis(location, length of message, identity of communicating-host,
frequency of message transmission)
• Active Attacks
• Masquerade
• Replay
• Modification of message
• Denial of service
Security Functional Requirements
Security functional requirements are the capabilities that a system or
product must posses to prevent unauthorized access, protect data
from unauthorized disclosures, and ensure the reliability of the
system.
Elements of security functional requirements
• Access Control
• Encryption
• Authentication
• Logging Monitoring
• Incident Response
Security Design Principles
Despite years of research and development, it has not been possible
to develop security design and implementation techniques that
systematically exclude security flaws and prevent all unauthorized
actions. In the absence of such foolproof techniques, it is useful to
have a set of widely agreed design principles that can guide the
development of protection mechanisms.
The National Centers of Academic Excellence in Information
Assurance/Cyber Defense list the following as fundamental security
design principles:
■ Economy of mechanism
■ Fail-safe defaults
■ Complete mediation
■ Open design
■ Separation of privilege
■ Least privilege
■ Least common mechanism
■ Psychological acceptability
■ Isolation
■ Encapsulation
■ Modularity
■ Layering
■ Least astonishment
Model for Network Security
Attack Surfaces