Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture...

17
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332

Transcript of Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture...

Page 1: Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.

Introduction andOverview of Information Security and Policy

By: Hashem Alaidaros4/10/2015

Lecture 1IS 332

Page 2: Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.

Main Points• Information Security and Policy Definition

• Key Security Concepts

• Key Security Concepts Relationship

Page 3: Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.

Definition Information security is the practice of protecting information from unauthorized access, use, disclosure, alert, inspection, recording or damage.

Information policy is the set of all public laws and regulations that control the creation, use, storage, access, and communication of information

Information security policy A set of rules and practices that specify or regulate how a system or organization provides security services to protect sensitive and critical system resources.

Page 4: Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.

© 2016 Pearson Education, Inc., Hoboken, NJ. All rights reserved.

Key Security Concepts

Confidentiality

• Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information

Integrity

• Guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity

Availability

• Ensuring timely and reliable access to and use of information

Page 5: Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.

Cyber Security vs. Cyber Crime Cyber-Security:

the protection of the confidentiality, integrity and availability of computer data and systems in order to enhance security, resilience, reliability and trust in ICT

Figure: Cyber security (read box)

and Cyber crime (blue box):◦ Commons◦ Differences

Page 6: Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.

Key Security Concepts Asset: Anything that has value to the organization.

◦ Tangible and Intangible assets.◦ Examples:

Threat: A potential cause of an unwanted incident, which may result in harm to a system or organization◦ Capable of exploiting vulnerabilities◦ Source: Intentional and Unintentional threats◦ Origin: Human and natural◦ Examples:

Exploit: A program or a “cookbook” on how to take advantage of a specific vulnerabilityExample:

Page 7: Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.

Key Security Concepts Vulnerability: A weakness of an asset or group of assets that can be exploited by a threat

◦ Vulnerability in: Code, Configuration, Design, Policy, Human, and Transfer◦ Example:◦ Categories of vulnerabilities

◦ Corrupted (loss of integrity)◦ Leaky (loss of confidentiality)◦ Unavailable or very slow (loss of availability)

Attack: is a threat that is carried out (threat action) and, if successful, leads to an undesirable violation of security, or threat consequence.

Page 8: Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.

Key Security Concepts Risk: An expectation of loss expressed as the probability that a particular threat will exploit a particular vulnerability with a particular harmful result. ◦ Risk level increase when:Threat level increaseAsset value increaseVulnerability is found

Risk = Threats x Vulnerabilities x Assets

Page 9: Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.

Key Security Concepts

Page 10: Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.

Importance of Key Security Concepts

To avoid the threats:

Know your self◦ Know the value of assets and information you have to be protected

Know your threats you might face◦ Intentional and Unintentional threats

Know your vulnerabilities you have◦ Scanning◦ Conducting ethical hacking (CEH holder)

Response to the threats◦ Actions to be taken to avoid the threats◦ Actions to be taken when the threats occur

Page 11: Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.

Key Security Concepts Security Control: Means of managing risk, including polices, procedures, guidelines, practices or organizational structures, which can be of administrative, technical, or management.◦ Example:

Countermeasure: is an action, device, procedure, or technique that reduces a threat, vulnerability, or an attack

◦ Example:

Page 12: Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.

Key Security Concepts Relationship

Ontology is a formal naming and definition of the types, properties, and interrelationships of the things (individual concepts) that really exist for a particular domain.

Each individual concept has a relationship with one or more of other concepts.

The ontology of the following figure has 5 top level classes: 1. asset, 2. Countermeasure (e.g. control), 3. organization, 4. threat and 5. vulnerability.

These 5 classes are the most basic in security area

Reference: Security Ontology for Adaptive Mapping of Security Standards S. Ramanauskait˙e, D. Olifer, N. Goranin, A. 2013

Page 13: Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.

The overview of the concepts and relationships in the information security ontology

Page 14: Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.

Key Security Concepts Relationship

The previous ontology can be extended as shown in the following figure.

The central elements are threats, vulnerabilities, controls, and their implementations.

As soon as a threat exploits a physical, technical, or administrative weakness, it gives rise to follow-up threats, represents a potential danger to the organization’s assets, and affects specific security attributes (e.g., confidentiality, integrity, and/or availability).

We also use potential threat origins (human or natural origin) and sources (accidental or deliberate source) to describe each threat.

Each vulnerability is assigned a severity value and the asset on which it could be exploited.

Decision makers have to implement controls to mitigate identified vulnerability and to protect the respective assets through preventive, corrective, recovery, or detective measures (control type).

Reference: Mapping ISO 27002 into Security Ontology, Ferran Alcázar, Vienna, Austria, 2004

Page 15: Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Page 16: Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.

Computer and Network Assets, with Examples of Threats.

Page 17: Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.

17

Multiple domains and Information Security

Information security draws upon the best practices and experiences from multiple domains including

◦ Compliance, policies, and standards◦ Administration, auditing, access controls, and permission controls◦ Intrusion detection and prevention and incident response◦ Software development security◦ Physical security◦ Operations control◦ Public key infrastructure and key management◦ Disaster recovery◦ Security testing ◦ Software development security◦ Antivirus solutions◦ Training and awareness