Podcast
Questions and Answers
What was a primary focus of early computer security efforts immediately following the development of the first mainframes?
What was a primary focus of early computer security efforts immediately following the development of the first mainframes?
- Creating software firewalls to protect against remote attacks.
- Developing sophisticated network intrusion detection systems.
- Physical controls limiting access to sensitive military locations. (correct)
- Implementing complex encryption algorithms.
Which of the following is the earliest known publication detailing password security in computer systems?
Which of the following is the earliest known publication detailing password security in computer systems?
- Time-Sharing Computer Systems. (correct)
- The UNIX System: UNIX Operating System Security.
- Protection Analysis: Final Report.
- Security Controls for Computer Systems.
In what year did researchers develop what is now known as IPSEC security?
In what year did researchers develop what is now known as IPSEC security?
- 1979
- 1978
- 1992 (correct)
- 1984
What was the initial focus of the Advanced Research Projects Agency (ARPA) in the 1960s regarding networked communications?
What was the initial focus of the Advanced Research Projects Agency (ARPA) in the 1960s regarding networked communications?
Which of the following represents a fundamental security problem identified with the early ARPANET?
Which of the following represents a fundamental security problem identified with the early ARPANET?
RAND Report R-609 is most notably recognized for initiating the study of what area?
RAND Report R-609 is most notably recognized for initiating the study of what area?
What security measure was NOT part of the expansion of computer security from physical security in the 1970s and 80s?
What security measure was NOT part of the expansion of computer security from physical security in the 1970s and 80s?
What key trend contributed significantly to the increased need for computer security in the 1990s?
What key trend contributed significantly to the increased need for computer security in the 1990s?
What critical factor is influenced by the security of every computer to which it is connected?
What critical factor is influenced by the security of every computer to which it is connected?
Which of the following best describes the concept of 'security' in the context of information systems?
Which of the following best describes the concept of 'security' in the context of information systems?
Which of the following is NOT one of the layers of security a successful organization should have in place?
Which of the following is NOT one of the layers of security a successful organization should have in place?
Which of the following has become viewed as inadequate within the C.I.A. triad?
Which of the following has become viewed as inadequate within the C.I.A. triad?
What fundamental principle does the McCumber Cube emphasize in the context of information security?
What fundamental principle does the McCumber Cube emphasize in the context of information security?
In the context of information security, what constitutes an 'information system'?
In the context of information security, what constitutes an 'information system'?
Which statement best describes the balance between information security and accessibility?
Which statement best describes the balance between information security and accessibility?
What is the key disadvantage of a bottom-up approach to information security implementation?
What is the key disadvantage of a bottom-up approach to information security implementation?
Which approach to information security implementation is initiated by upper management?
Which approach to information security implementation is initiated by upper management?
What is the formal development strategy often associated with the most successful type of top-down approach?
What is the formal development strategy often associated with the most successful type of top-down approach?
What is the primary question addressed during the 'Investigation' phase of the Systems Development Life Cycle (SDLC)?
What is the primary question addressed during the 'Investigation' phase of the Systems Development Life Cycle (SDLC)?
In which phase of the SDLC are objectives, constraints, and project scope defined?
In which phase of the SDLC are objectives, constraints, and project scope defined?
What primarily takes place during the Analysis phase of the Systems Development Life Cycle (SDLC)?
What primarily takes place during the Analysis phase of the Systems Development Life Cycle (SDLC)?
Which of the following occurs during the Logical Design phase of the SDLC?
Which of the following occurs during the Logical Design phase of the SDLC?
During which phase of the SDLC are specific technologies selected to support the alternatives identified?
During which phase of the SDLC are specific technologies selected to support the alternatives identified?
Which output is created during the Implementation phase of Systems Development Life Cycle (SDLC)?
Which output is created during the Implementation phase of Systems Development Life Cycle (SDLC)?
Which SDLC phase is typically the most time-consuming and costly?
Which SDLC phase is typically the most time-consuming and costly?
What is the primary goal of Software Assurance (SA)?
What is the primary goal of Software Assurance (SA)?
What does the acronym SwA CBK stand for?
What does the acronym SwA CBK stand for?
Which of the following is NOT a section contained within the SwA CBK?
Which of the following is NOT a section contained within the SwA CBK?
Which software design principle advocates for verifying authority for every access to every object?
Which software design principle advocates for verifying authority for every access to every object?
What recommendation does NIST Special Publication 800-64, rev. 2, make regarding security in the SDLC?
What recommendation does NIST Special Publication 800-64, rev. 2, make regarding security in the SDLC?
According to NIST, what key security activity should be performed during the Initiation phase?
According to NIST, what key security activity should be performed during the Initiation phase?
During which phase of the NIST approach to securing the SDLC is risk assessment conducted?
During which phase of the NIST approach to securing the SDLC is risk assessment conducted?
What action is performed during the NIST Implementation/Assessment phase?
What action is performed during the NIST Implementation/Assessment phase?
Which of the following activities takes place during the Operations and Maintenance phase of the NIST approach to securing the SDLC?
Which of the following activities takes place during the Operations and Maintenance phase of the NIST approach to securing the SDLC?
Which activity is associated with the Disposal phase of the NIST approach?
Which activity is associated with the Disposal phase of the NIST approach?
Which individual typically has primary responsibility for assessment, management, and implementation of IS in the organization?
Which individual typically has primary responsibility for assessment, management, and implementation of IS in the organization?
Which role is responsible for the security and use of a particular set of information?
Which role is responsible for the security and use of a particular set of information?
What perspective does security as a social science primarily consider?
What perspective does security as a social science primarily consider?
In the context of information security, the concept of the 'security artisan' suggests that:
In the context of information security, the concept of the 'security artisan' suggests that:
Which statement accurately reflects the perspective of security as a science?
Which statement accurately reflects the perspective of security as a science?
Flashcards
Physical Controls
Physical Controls
Controls that limit physical access to sensitive locations.
Rudimentary Defending
Rudimentary Defending
Security in the early stages focused on protecting physical locations.
Scope of Computer Security
Scope of Computer Security
A multi-faceted approach to security that includes data protection, access control, and personnel.
The Internet
The Internet
Signup and view all the flashcards
Information Security
Information Security
Signup and view all the flashcards
C.I.A. Triad
C.I.A. Triad
Signup and view all the flashcards
Availability
Availability
Signup and view all the flashcards
Vulnerability
Vulnerability
Signup and view all the flashcards
Threat
Threat
Signup and view all the flashcards
Exploit
Exploit
Signup and view all the flashcards
Loss
Loss
Signup and view all the flashcards
Authenticity
Authenticity
Signup and view all the flashcards
Accuracy
Accuracy
Signup and view all the flashcards
Availability
Availability
Signup and view all the flashcards
Confidentiality
Confidentiality
Signup and view all the flashcards
Utility
Utility
Signup and view all the flashcards
Information System (IS)
Information System (IS)
Signup and view all the flashcards
Bottom-Up Approach
Bottom-Up Approach
Signup and view all the flashcards
Top-Down Approach
Top-Down Approach
Signup and view all the flashcards
SDLC (Systems Development Life Cycle)
SDLC (Systems Development Life Cycle)
Signup and view all the flashcards
Investigation Phase
Investigation Phase
Signup and view all the flashcards
Analysis Phase
Analysis Phase
Signup and view all the flashcards
Logical Phase
Logical Phase
Signup and view all the flashcards
Physical Phase
Physical Phase
Signup and view all the flashcards
Implementation Phase
Implementation Phase
Signup and view all the flashcards
Maintenance Phase
Maintenance Phase
Signup and view all the flashcards
Software Assurance (SA)
Software Assurance (SA)
Signup and view all the flashcards
NIST Special Publication 800-64
NIST Special Publication 800-64
Signup and view all the flashcards
NIST Approach: Initiation
NIST Approach: Initiation
Signup and view all the flashcards
NIST Approach: Development
NIST Approach: Development
Signup and view all the flashcards
NIST Approach: Implementation
NIST Approach: Implementation
Signup and view all the flashcards
NIST Approach: Maintenance
NIST Approach: Maintenance
Signup and view all the flashcards
NIST Approach: Disposal
NIST Approach: Disposal
Signup and view all the flashcards
Chief Information Security Officer (CISO)
Chief Information Security Officer (CISO)
Signup and view all the flashcards
Data Owners
Data Owners
Signup and view all the flashcards
Data Custodians
Data Custodians
Signup and view all the flashcards
Data Users
Data Users
Signup and view all the flashcards
Information Security
Information Security
Signup and view all the flashcards
Security as Art
Security as Art
Signup and view all the flashcards
Security as Science
Security as Science
Signup and view all the flashcards
Security as Social Science
Security as Social Science
Signup and view all the flashcards
Study Notes
History of Information Security
- Computer security started right after the construction of the first mainframes
- Code-breaking groups during WWII made the first modern computers with multiple levels of security
- Original security focused on physical controls and rudimentary defenses against physical threats like theft and sabotage
Key Dates in Information Security
- 1968: Password security discussed by by Maurice Wilkes in Time - Sharing Computer Systems
- 1970: Security Controls for Computer Systems report was written identifying the need for computer security by Willis H. Ware
- 1973: Schell, Downey, and Popek examined the needed security in military systems
- 1975: The Federal Information Processing Standards reviews the Digital Encryption Standard
- 1978: Bisbey and Hollingsworth published "Protection Analysis: Final Report:" describing ARPA's Protection Analysis project
- 1979: Dennis Ritchie publishes "On the Security of UNIX" discussing secure user IDs,secure group IDs, and the problems in systems
- 1982: The Department of Defense Computer Security Evaluation Center publishes Trusted Computer Security (TCSEC) documents
- 1982: Grampp and Morris write "The UNIX System: UNIX Operating System Security" examining four handles to security
- 1984: Reeds and Weinberger publish "File Security and the UNIX System Crypt Command" saying no technique can be secure
- 1992: The Simple Internet Protocol Plus (SIPP) Security protocols were developed creating what is now known as IPSEC security
Development in the 1960s
- Redundant networked communications examined the feasibility of the Advanced Research Projects Agency (ARPA)
- Larry Roberts developed ARPANET from its inception.
Advancements of the 1970s and 1980s
- ARPANET grew in popularity along with concerns of misuse
- Fundamental problems with ARPANET security were identified like nonexistent user ID and authentication
- Safeguarding of data was improved
- Efforts to limit unauthorized and random data access was advanced
- Involvement of multiple levels of personnel in security increased
- RAND Report R-609 started the study of computer security
Developments in the 1990s
- Networks of computers became more common, as did the need to connect them
- The Internet became the first global network
- Network connections initially used de facto standards
- Security was a low priority in the early Internet deployments
- DEFCON conference was established in 1993 for those interested in information security
Developments from 2000 to Present
- Millions of unsecured computer networks are brought together with the Internet continuously
- The Growing threat of cyber attacks has increased the awareness of the need for security
- There are now nation states engaging in information warfare
- The security of one computer impacts the overall security of connected computer networks
Defining Security
- Security is the state of being secure and free from danger or harm
- It is a necessary action taken to make someone or something secure
- Multiple layers should be in place within a successful organization to protect operations, infrastructure, people, functions, communications, and information
Information Security Defined
- Information security is the protection of information and its critical elements
- Includes systems and hardware that use, store, and transmit information
- Encompasses information security management, data security, and network security
- The C.I.A. triad is a confidentiality, integrity, and availability standard now viewed as inadequate
- An expanded model consists of a list of critical information characteristics
Key Information Security Concepts
- Access: Subject's ability to interact with an asset
- Asset: Resource being protected
- Attack: Potential risk to an organization's operations
- Control: Countermeasure to prevent exploit of vulnerability
- Exploit: Technique to compromise a system
- Exposure: Condition of vulnerability of informational assets
- Loss: Single instance of damage to information
- Protection profile: Security posture of an organization
Key Threats
- Risk: Probability of damage or loss if a vulnerability is exploited
- Subjects of attack: Agents used to conduct attack
- Threat: Potential risk to an asset
- Threat Agent: System or method used to conduct attack
- Threat event: Occurrence of threat
- Threat source: Category of object or person representing danger
- A computer can be either the subject, or the object of an attack
Critical Characteristics of Information
- Availability: Authorized users can access information in a timely manner
- Accuracy: Free from error with true and correct format
- Authenticity: Original and uncorrupted status
- Confidentiality: Shielding of data from unauthorized access
- Integrity: Uncorrupted and precise state
- Utility: Value for a purpose
- Possession: Ownership or control
Information Systems
- Information systems (IS) are the entire set of people, procedures, and technology
- IS enables business to use information through programs, hardware, data, people, procedures, and networks
Balancing Act
- Perfect security is impossible to achieve and as such, it is a process, not a goal
- Security should be a trade-off between protection and availability
- Reasonably accessible security should be implemented that can protect againts threats
Information Security Approaches
- Grassroots efforts are a process where system administrators improve security of their systems
- While it does make use of technical expertise, it lacks broad organizational support
- Top-down approaches involve formal development strategy implementing a systems development life cycle
SDLC Defined
- Systems development life cycle (SDLC) provides the methodology for the design and implementation of an information system
- They utilize formal problem solving approaches with a structured sequence of procedures with clearly defined goals
- It increases the probability of success implementing processes
SDLC Phases
- Investigation: What problem is the system being developed to solve?
- Objectives, constraints, and scope of project are specified
- Preliminary costs and benefits analysis is developed
- Analysis: Consists of assessments of the organization, current systems, and systems capability to support proposed systems
- Analysts determine what the new system is expected to do and how it will interact with existing systems
- Analysis ends with documentation of findings and an update of feasibility
- Logical Designs: Applications that are selected will provide needed services and data support
- Analysts generate estimates of costs and benefits
- Feasibility analysis is performed at the end
- Feasibility analysis is performed
- Physical Design: Specific technologies are selected to support alternatives identified and evaluated that have cost effective components
- It should be presented to management for approval
- Implementation: Needed software, components, and training should be done for acceptance after a performance review
- Maintenance and Change: Ongoing tasks must support and modify the system
Software Assurance
- Software assurance (SA) is an established procedure used to create deployable and secure software
- The U.S. Department of Defense and Department of Homeland Security supported the Software Assurance Initiative
- It resulted in the Secure Software Assurance (SwA) Common Body of Knowledge (CBK) Publication
- The SwA CBK, under development, contains info on Nature of Dangers, Concepts and Principles, Ethics, Law, and Governance
Software Design Principles
- Keep design simple and small
- Base access based on permission
- Verify every object for authority
- Possesion of keys and passwords
- Utilize 2 factor identification
- Limit access privilages
NIST and Securing SDLC
- Integrating with NIST enhances security in the SDLC
- Early identification and mitigation of security vulnerabilities
- Awareness of potential engineering challenges
- Facilitation of informed executive decision making
Implementing NIST
- NIST implements certain actions in the initiation, acquisition, system testing, operation, and disposal phases
- Security at this point is looked at in terms of business risks, with security office providing input
- They perform risk assessments, analyze security requirements, and design security architecture
- NIST also integrates information system into it's environment. Additionally, they are instituting process and procedure for assured operations
- NIST builds and executes disposal/transition plans with Archival of critical information
Security Professionals
- Wide range of professionals are required to support a diverse information security program
- Senior management and administrative support are key components along with technical expertise
Teams and Positions
- The Chief Information Officer (CIO) is a Senior technology officer responsible for advising senior executives on strategic planning
- The Chief Information Security Officer (CISO) has primary responsibility for assessment, management, and implementation of IS in the organization
- A team includes experts in technical, non technical security policies , and risk assessments
- Data owners are senior management responsible for the security and use of a particular set of information
- Data custodians are responsible for the information and systems that process, transmit, and store it
How is Security Viewed
- It is a Group of individuals united by similar interests/values within an organization
- It incorporates information security management, technology, and organizational management teams
- Implementation of information security is often described as a combination of art and science
- It has no hard and fast rules and virtually all actions in computer systems are the result of interacting hardware and software
- Security administrators should be aware of interactions between the system and its behaviors by individuals.
- This can greatly reduce the levels of risk caused by end users.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.