History of information security

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What was a primary focus of early computer security efforts immediately following the development of the first mainframes?

  • Creating software firewalls to protect against remote attacks.
  • Developing sophisticated network intrusion detection systems.
  • Physical controls limiting access to sensitive military locations. (correct)
  • Implementing complex encryption algorithms.

Which of the following is the earliest known publication detailing password security in computer systems?

  • Time-Sharing Computer Systems. (correct)
  • The UNIX System: UNIX Operating System Security.
  • Protection Analysis: Final Report.
  • Security Controls for Computer Systems.

In what year did researchers develop what is now known as IPSEC security?

  • 1979
  • 1978
  • 1992 (correct)
  • 1984

What was the initial focus of the Advanced Research Projects Agency (ARPA) in the 1960s regarding networked communications?

<p>Examining the feasibility of redundant networked communications. (D)</p> Signup and view all the answers

Which of the following represents a fundamental security problem identified with the early ARPANET?

<p>A lack of safety procedures for dial-up connections. (C)</p> Signup and view all the answers

RAND Report R-609 is most notably recognized for initiating the study of what area?

<p>Computer Security (B)</p> Signup and view all the answers

What security measure was NOT part of the expansion of computer security from physical security in the 1970s and 80s?

<p>Implementing mandatory background checks for all employees. (D)</p> Signup and view all the answers

What key trend contributed significantly to the increased need for computer security in the 1990s?

<p>Networks of computers became more common and connected to each other. (D)</p> Signup and view all the answers

What critical factor is influenced by the security of every computer to which it is connected?

<p>The ability to secure a computer's data (A)</p> Signup and view all the answers

Which of the following best describes the concept of 'security' in the context of information systems?

<p>The process of achieving a state of being secure and free from danger or harm. (B)</p> Signup and view all the answers

Which of the following is NOT one of the layers of security a successful organization should have in place?

<p>Public perception (A)</p> Signup and view all the answers

Which of the following has become viewed as inadequate within the C.I.A. triad?

<p>All of the above. (D)</p> Signup and view all the answers

What fundamental principle does the McCumber Cube emphasize in the context of information security?

<p>The multidimensional nature of security, incorporating technology, policy, and human factors. (D)</p> Signup and view all the answers

In the context of information security, what constitutes an 'information system'?

<p>The entire set of people, procedures, and technology that enable business to use information. (A)</p> Signup and view all the answers

Which statement best describes the balance between information security and accessibility?

<p>Security should balance protection with reasonable access. (A)</p> Signup and view all the answers

What is the key disadvantage of a bottom-up approach to information security implementation?

<p>It often lacks participant support and organizational staying power. (C)</p> Signup and view all the answers

Which approach to information security implementation is initiated by upper management?

<p>Top-down approach (C)</p> Signup and view all the answers

What is the formal development strategy often associated with the most successful type of top-down approach?

<p>Systems development life cycle (D)</p> Signup and view all the answers

What is the primary question addressed during the 'Investigation' phase of the Systems Development Life Cycle (SDLC)?

<p>What problem is the system being developed to solve? (D)</p> Signup and view all the answers

In which phase of the SDLC are objectives, constraints, and project scope defined?

<p>Investigation (B)</p> Signup and view all the answers

What primarily takes place during the Analysis phase of the Systems Development Life Cycle (SDLC)?

<p>Assessments of the organization, current systems, and capabilities. (D)</p> Signup and view all the answers

Which of the following occurs during the Logical Design phase of the SDLC?

<p>Identification of data support and structures for needed inputs. (B)</p> Signup and view all the answers

During which phase of the SDLC are specific technologies selected to support the alternatives identified?

<p>Physical Design (B)</p> Signup and view all the answers

Which output is created during the Implementation phase of Systems Development Life Cycle (SDLC)?

<p>Supporting documentation for users. (D)</p> Signup and view all the answers

Which SDLC phase is typically the most time-consuming and costly?

<p>Maintenance and Change (C)</p> Signup and view all the answers

What is the primary goal of Software Assurance (SA)?

<p>To create software more capable of being deployed in a secure fashion. (C)</p> Signup and view all the answers

What does the acronym SwA CBK stand for?

<p>Secure Software Assurance Common Body of Knowledge (A)</p> Signup and view all the answers

Which of the following is NOT a section contained within the SwA CBK?

<p>System Architecture Blueprints (B)</p> Signup and view all the answers

Which software design principle advocates for verifying authority for every access to every object?

<p>Checking every access for authority. (C)</p> Signup and view all the answers

What recommendation does NIST Special Publication 800-64, rev. 2, make regarding security in the SDLC?

<p>Integrate security early to maximize return on investment. (C)</p> Signup and view all the answers

According to NIST, what key security activity should be performed during the Initiation phase?

<p>Delineating business requirements in terms of CIA. (B)</p> Signup and view all the answers

During which phase of the NIST approach to securing the SDLC is risk assessment conducted?

<p>Development/Acquisition (B)</p> Signup and view all the answers

What action is performed during the NIST Implementation/Assessment phase?

<p>Integrating information system into its environment. (B)</p> Signup and view all the answers

Which of the following activities takes place during the Operations and Maintenance phase of the NIST approach to securing the SDLC?

<p>Conducting operational readiness review (B)</p> Signup and view all the answers

Which activity is associated with the Disposal phase of the NIST approach?

<p>Building and executing a disposal/transition plan (B)</p> Signup and view all the answers

Which individual typically has primary responsibility for assessment, management, and implementation of IS in the organization?

<p>Chief Information Security Officer (CISO) (B)</p> Signup and view all the answers

Which role is responsible for the security and use of a particular set of information?

<p>Data Owners (A)</p> Signup and view all the answers

What perspective does security as a social science primarily consider?

<p>The behavior of individuals interacting with systems. (A)</p> Signup and view all the answers

In the context of information security, the concept of the 'security artisan' suggests that:

<p>Security implementation relies heavily on the skills and perception of system technologists. (D)</p> Signup and view all the answers

Which statement accurately reflects the perspective of security as a science?

<p>Specific conditions lead to predictable actions in computer systems, allowing for fault resolution. (B)</p> Signup and view all the answers

Flashcards

Physical Controls

Controls that limit physical access to sensitive locations.

Rudimentary Defending

Security in the early stages focused on protecting physical locations.

Scope of Computer Security

A multi-faceted approach to security that includes data protection, access control, and personnel.

The Internet

The first global network, connecting numerous computer networks.

Signup and view all the flashcards

Information Security

The protection of information and its critical elements.

Signup and view all the flashcards

C.I.A. Triad

Confidentiality, Integrity, and Availability; a standard for security.

Signup and view all the flashcards

Availability

The state of being accessible and usable upon demand by an authorized user.

Signup and view all the flashcards

Vulnerability

A flaw or weakness in a system that could be exploited.

Signup and view all the flashcards

Threat

An event or condition that has the potential to cause harm.

Signup and view all the flashcards

Exploit

An action that takes advantage of a vulnerability.

Signup and view all the flashcards

Loss

A loss of some characteristic of information.

Signup and view all the flashcards

Authenticity

The characteristic of being genuine or authentic.

Signup and view all the flashcards

Accuracy

Reliability and correctness of information.

Signup and view all the flashcards

Availability

Ready and accessible when needed.

Signup and view all the flashcards

Confidentiality

Information is protected from disclosure.

Signup and view all the flashcards

Utility

Refers to the quality of having value for some purpose or objective.

Signup and view all the flashcards

Information System (IS)

An organized collection of components to support business functions.

Signup and view all the flashcards

Bottom-Up Approach

Systems administrators improving security from the ground up.

Signup and view all the flashcards

Top-Down Approach

Upper management initiates processes, policies, and procedures.

Signup and view all the flashcards

SDLC (Systems Development Life Cycle)

A methodology for the design and implementation of an information system.

Signup and view all the flashcards

Investigation Phase

The initial phase in the SDLC to define the problem.

Signup and view all the flashcards

Analysis Phase

Phase where assessments and system expectations are determined .

Signup and view all the flashcards

Logical Phase

Delineating specific technologies to implement solution.

Signup and view all the flashcards

Physical Phase

Entire solution presented to organization for approval.

Signup and view all the flashcards

Implementation Phase

The phase to order components for the solution.

Signup and view all the flashcards

Maintenance Phase

The longest, most expensive phase that supports the system's lifecycle.

Signup and view all the flashcards

Software Assurance (SA)

A common body of knowledge focused on secure software design.

Signup and view all the flashcards

NIST Special Publication 800-64

Early SDLC integration of security maximizes ROI through several benefits.

Signup and view all the flashcards

NIST Approach: Initiation

Security looked at in terms of business risks and security input.

Signup and view all the flashcards

NIST Approach: Development

Supplement security controls and analyze security requirements.

Signup and view all the flashcards

NIST Approach: Implementation

Integrating information system tests with security controls.

Signup and view all the flashcards

NIST Approach: Maintenance

Operating and enhancing operations.

Signup and view all the flashcards

NIST Approach: Disposal

Transition and disposal plans, archive info, sanitize, and dispose of hardware.

Signup and view all the flashcards

Chief Information Security Officer (CISO)

Leads assessment management and implementation of IS in organization.

Signup and view all the flashcards

Data Owners

Management accountable for information and data.

Signup and view all the flashcards

Data Custodians

Responsible for system data processes,transmissions, and storage.

Signup and view all the flashcards

Data Users

Have security role and use data.

Signup and view all the flashcards

Information Security

Art, Science, and Social Science.

Signup and view all the flashcards

Security as Art

No hard and fast rules. No manual through entire system.

Signup and view all the flashcards

Security as Science

Computer actions caused by specific software, hardware, faults, and systems.

Signup and view all the flashcards

Security as Social Science

End users reduce risks via acceptable, supportable security profiles.

Signup and view all the flashcards

Study Notes

History of Information Security

  • Computer security started right after the construction of the first mainframes
  • Code-breaking groups during WWII made the first modern computers with multiple levels of security
  • Original security focused on physical controls and rudimentary defenses against physical threats like theft and sabotage

Key Dates in Information Security

  • 1968: Password security discussed by by Maurice Wilkes in Time - Sharing Computer Systems
  • 1970: Security Controls for Computer Systems report was written identifying the need for computer security by Willis H. Ware
  • 1973: Schell, Downey, and Popek examined the needed security in military systems
  • 1975: The Federal Information Processing Standards reviews the Digital Encryption Standard
  • 1978: Bisbey and Hollingsworth published "Protection Analysis: Final Report:" describing ARPA's Protection Analysis project
  • 1979: Dennis Ritchie publishes "On the Security of UNIX" discussing secure user IDs,secure group IDs, and the problems in systems
  • 1982: The Department of Defense Computer Security Evaluation Center publishes Trusted Computer Security (TCSEC) documents
  • 1982: Grampp and Morris write "The UNIX System: UNIX Operating System Security" examining four handles to security
  • 1984: Reeds and Weinberger publish "File Security and the UNIX System Crypt Command" saying no technique can be secure
  • 1992: The Simple Internet Protocol Plus (SIPP) Security protocols were developed creating what is now known as IPSEC security

Development in the 1960s

  • Redundant networked communications examined the feasibility of the Advanced Research Projects Agency (ARPA)
  • Larry Roberts developed ARPANET from its inception.

Advancements of the 1970s and 1980s

  • ARPANET grew in popularity along with concerns of misuse
  • Fundamental problems with ARPANET security were identified like nonexistent user ID and authentication
  • Safeguarding of data was improved
  • Efforts to limit unauthorized and random data access was advanced
  • Involvement of multiple levels of personnel in security increased
  • RAND Report R-609 started the study of computer security

Developments in the 1990s

  • Networks of computers became more common, as did the need to connect them
  • The Internet became the first global network
  • Network connections initially used de facto standards
  • Security was a low priority in the early Internet deployments
  • DEFCON conference was established in 1993 for those interested in information security

Developments from 2000 to Present

  • Millions of unsecured computer networks are brought together with the Internet continuously
  • The Growing threat of cyber attacks has increased the awareness of the need for security
  • There are now nation states engaging in information warfare
  • The security of one computer impacts the overall security of connected computer networks

Defining Security

  • Security is the state of being secure and free from danger or harm
  • It is a necessary action taken to make someone or something secure
  • Multiple layers should be in place within a successful organization to protect operations, infrastructure, people, functions, communications, and information

Information Security Defined

  • Information security is the protection of information and its critical elements
  • Includes systems and hardware that use, store, and transmit information
  • Encompasses information security management, data security, and network security
  • The C.I.A. triad is a confidentiality, integrity, and availability standard now viewed as inadequate
  • An expanded model consists of a list of critical information characteristics

Key Information Security Concepts

  • Access: Subject's ability to interact with an asset
  • Asset: Resource being protected
  • Attack: Potential risk to an organization's operations
  • Control: Countermeasure to prevent exploit of vulnerability
  • Exploit: Technique to compromise a system
  • Exposure: Condition of vulnerability of informational assets
  • Loss: Single instance of damage to information
  • Protection profile: Security posture of an organization

Key Threats

  • Risk: Probability of damage or loss if a vulnerability is exploited
  • Subjects of attack: Agents used to conduct attack
  • Threat: Potential risk to an asset
  • Threat Agent: System or method used to conduct attack
  • Threat event: Occurrence of threat
  • Threat source: Category of object or person representing danger
  • A computer can be either the subject, or the object of an attack

Critical Characteristics of Information

  • Availability: Authorized users can access information in a timely manner
  • Accuracy: Free from error with true and correct format
  • Authenticity: Original and uncorrupted status
  • Confidentiality: Shielding of data from unauthorized access
  • Integrity: Uncorrupted and precise state
  • Utility: Value for a purpose
  • Possession: Ownership or control

Information Systems

  • Information systems (IS) are the entire set of people, procedures, and technology
  • IS enables business to use information through programs, hardware, data, people, procedures, and networks

Balancing Act

  • Perfect security is impossible to achieve and as such, it is a process, not a goal
  • Security should be a trade-off between protection and availability
  • Reasonably accessible security should be implemented that can protect againts threats

Information Security Approaches

  • Grassroots efforts are a process where system administrators improve security of their systems
  • While it does make use of technical expertise, it lacks broad organizational support
  • Top-down approaches involve formal development strategy implementing a systems development life cycle

SDLC Defined

  • Systems development life cycle (SDLC) provides the methodology for the design and implementation of an information system
  • They utilize formal problem solving approaches with a structured sequence of procedures with clearly defined goals
  • It increases the probability of success implementing processes

SDLC Phases

  • Investigation: What problem is the system being developed to solve?
  • Objectives, constraints, and scope of project are specified
  • Preliminary costs and benefits analysis is developed
  • Analysis: Consists of assessments of the organization, current systems, and systems capability to support proposed systems
  • Analysts determine what the new system is expected to do and how it will interact with existing systems
  • Analysis ends with documentation of findings and an update of feasibility
  • Logical Designs: Applications that are selected will provide needed services and data support
  • Analysts generate estimates of costs and benefits
  • Feasibility analysis is performed at the end
  • Feasibility analysis is performed
  • Physical Design: Specific technologies are selected to support alternatives identified and evaluated that have cost effective components
  • It should be presented to management for approval
  • Implementation: Needed software, components, and training should be done for acceptance after a performance review
  • Maintenance and Change: Ongoing tasks must support and modify the system

Software Assurance

  • Software assurance (SA) is an established procedure used to create deployable and secure software
  • The U.S. Department of Defense and Department of Homeland Security supported the Software Assurance Initiative
  • It resulted in the Secure Software Assurance (SwA) Common Body of Knowledge (CBK) Publication
  • The SwA CBK, under development, contains info on Nature of Dangers, Concepts and Principles, Ethics, Law, and Governance

Software Design Principles

  • Keep design simple and small
  • Base access based on permission
  • Verify every object for authority
  • Possesion of keys and passwords
  • Utilize 2 factor identification
  • Limit access privilages

NIST and Securing SDLC

  • Integrating with NIST enhances security in the SDLC
  • Early identification and mitigation of security vulnerabilities
  • Awareness of potential engineering challenges
  • Facilitation of informed executive decision making

Implementing NIST

  • NIST implements certain actions in the initiation, acquisition, system testing, operation, and disposal phases
  • Security at this point is looked at in terms of business risks, with security office providing input
  • They perform risk assessments, analyze security requirements, and design security architecture
  • NIST also integrates information system into it's environment. Additionally, they are instituting process and procedure for assured operations
  • NIST builds and executes disposal/transition plans with Archival of critical information

Security Professionals

  • Wide range of professionals are required to support a diverse information security program
  • Senior management and administrative support are key components along with technical expertise

Teams and Positions

  • The Chief Information Officer (CIO) is a Senior technology officer responsible for advising senior executives on strategic planning
  • The Chief Information Security Officer (CISO) has primary responsibility for assessment, management, and implementation of IS in the organization
  • A team includes experts in technical, non technical security policies , and risk assessments
  • Data owners are senior management responsible for the security and use of a particular set of information
  • Data custodians are responsible for the information and systems that process, transmit, and store it

How is Security Viewed

  • It is a Group of individuals united by similar interests/values within an organization
  • It incorporates information security management, technology, and organizational management teams
  • Implementation of information security is often described as a combination of art and science
  • It has no hard and fast rules and virtually all actions in computer systems are the result of interacting hardware and software
  • Security administrators should be aware of interactions between the system and its behaviors by individuals.
  • This can greatly reduce the levels of risk caused by end users.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

History of Information Security
12 questions
Information Security History Quiz
40 questions
Information Security History
37 questions

Information Security History

AppreciableWaterfall4654 avatar
AppreciableWaterfall4654
Use Quizgecko on...
Browser
Browser