Information Security Fundamentals

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Why is knowledge of IT security crucial for IT experts, according to the information provided?

  • To understand vulnerabilities and contribute to solutions. (correct)
  • To become part of the problem in IT systems.
  • To avoid learning about IT security altogether.
  • To solely focus on developing IT systems.

What is the primary aim of studying information security in the context of dynamic environments regarding security challenges?

  • To ignore the vulnerabilities of the information system.
  • To avoid the use of proactive countermeasures.
  • To understand prominent security challenges. (correct)
  • To disregard response and recovery capabilities.

In which of the following states is information considered vulnerable to threats?

  • During processing (use) only.
  • During storage only.
  • During storage, transmission, and processing (use). (correct)
  • Only during transmission.

Why is it impossible to solve all information security problems once and for all?

<p>Due to rapid innovation introducing new vulnerabilities. (A)</p> Signup and view all the answers

According to the Ponemon Institute's data on cyber attacks, which type of attack was most prevalent among the 254 companies surveyed?

<p>Malware (D)</p> Signup and view all the answers

According to Arbor Networks' analysis of security trends, which type of attack poses a major concern of service providers?

<p>DDoS attacks. (A)</p> Signup and view all the answers

In the context of DDoS attacks, what is the primary goal of volumetric attacks?

<p>To exhaust the bandwidth of the target network. (B)</p> Signup and view all the answers

Which of the following is a common motivation behind DDoS attacks?

<p>Nihilism/vandalism (B)</p> Signup and view all the answers

According to the attack target mix, what is the most common target of cyber attacks?

<p>Customers (B)</p> Signup and view all the answers

What is the main objective of Computer Security as defined?

<p>Preserving the integrity, availability, and confidentiality of information system resources (D)</p> Signup and view all the answers

What are the three properties that define the traditional definition of information security?

<p>CIA - Confidentiality, Integrity, Availability (C)</p> Signup and view all the answers

Which of the following is the MOST accurate definition of 'Confidentiality' in the context of information security?

<p>Protecting information from unauthorized disclosure. (B)</p> Signup and view all the answers

What is the primary goal of 'Data Integrity' in information security?

<p>To prevent unauthorized data modification or destruction. (B)</p> Signup and view all the answers

What is the main threat that 'Availability' aims to address?

<p>Denial of Service (DoS) (C)</p> Signup and view all the answers

What is the primary purpose of Data Privacy concerning personal information?

<p>To protect specific aspects of information related to natural persons. (A)</p> Signup and view all the answers

In the context of security, what is the main goal of authentication?

<p>Verifying a claimed identity. (C)</p> Signup and view all the answers

What type of attack is mitigated by techniques that attempt to consume the connection state tables?

<p>TCP State-Exhaustion (C)</p> Signup and view all the answers

What is the primary goal of non-repudiation in security?

<p>Making sending and receiving messages undeniable. (B)</p> Signup and view all the answers

What is the main goal of accountability in the context of security?

<p>Tracing actions to a specific user and holding them responsible. (B)</p> Signup and view all the answers

What is the primary function of authorization in IT security?

<p>Specifying access and usage permissions. (C)</p> Signup and view all the answers

What is a zero-day vulnerability?

<p>A vulnerability that is unknown to the vendor or public. (C)</p> Signup and view all the answers

Which phase of IAM(Identity and Access Management) includes Registration, Provisioning, and Authorization?

<p>Configuration phase. (D)</p> Signup and view all the answers

In the context of security, what is an 'attack'?

<p>An abstract entity of information which may vary according to the situation (C)</p> Signup and view all the answers

Which element is essential for an attacker or threat to successfully harm a target system?

<p>A method, opportunity, and motivation (A)</p> Signup and view all the answers

Within the realm of threats, which action involves gaining unauthorized access to an asset?

<p>Interception (D)</p> Signup and view all the answers

In cybersecurity, what constitutes a 'vulnerability' in a System?

<p>An aspect of a system or network that leaves it open to attack. (C)</p> Signup and view all the answers

What is an 'intrusion' in the context of cybersecurity?

<p>An activity that does not respect the system's security policy (B)</p> Signup and view all the answers

What does an 'alert' typically describe in the context of cybersecurity?

<p>A description of an attack conveyed by monitoring system parameters (A)</p> Signup and view all the answers

When considering different visions of cyber-attacks, what concept does a 'threat' primarily involve?

<p>Outcome and probability. (D)</p> Signup and view all the answers

What are security services primarily aimed at?

<p>Supporting specific controls. (A)</p> Signup and view all the answers

Which of these is classified as a physical security control?

<p>Facility protection (B)</p> Signup and view all the answers

Which of the following security controls aims/aims to prevent attempts to exploit vulnerabilities?

<p>Preventive controls (B)</p> Signup and view all the answers

In the context of security countermeasures, what is a proactive measure?

<p>Security awareness training (B)</p> Signup and view all the answers

What type of vulnerability is being addressed if a vulnerability mitigation is available?

<p>Reactive (A)</p> Signup and view all the answers

Which of the following statements is true about system authentication?

<p>Can be the corroboration (verification) that a peer entity (system) connection is the one claimed (X.800). (D)</p> Signup and view all the answers

Which of the following attacks attempts to consume the bandwidth?

<p>Volumetric Attacks (B)</p> Signup and view all the answers

What's the goal of sending and receiving messages being undeniable?

<p>Non-Repudiation (A)</p> Signup and view all the answers

Flashcards

Information Security

Protecting information from damage or harm.

Information Security

Protecting information assets from harm or damage.

Assets to protect

Data, software, IT equipment, and infrastructure.

Information States

Storage, transmission, and during processing.

Signup and view all the flashcards

Computer Security

The protection afforded to an automatic information system to attain applicable objectives of preserving integrity, availability, and confidentiality of information system resources.

Signup and view all the flashcards

Security Services

The protection to an automatic information system to attain applicable objectives of preserving integrity, availability, and confidentiality of information system resources.

Signup and view all the flashcards

Confidentiality

The property that information is not available or disclosed to unauthorized individuals, entities, or processes.

Signup and view all the flashcards

Integrity

The property that data has not been altered or destroyed in an unauthorized manner.

Signup and view all the flashcards

Availability

The property of being accessible and usable upon demand by an authorized entity.

Signup and view all the flashcards

User Authentication

Verifying a claimed identity of a (legal) user when accessing a system or an application.

Signup and view all the flashcards

Organization authentication

Verifying a claimed identity of a (legal) organization in an online interaction/session.

Signup and view all the flashcards

System Authentication

The corroboration (verification) that a peer entity (system) in an association (connection, session) is the one claimed.

Signup and view all the flashcards

Non-Repudiation

Goal of making sending and receiving messages undiable through unforgivable evidence

Signup and view all the flashcards

Accountability

Trace action to a specific user and hold responsible.

Signup and view all the flashcards

Authorization

Specify access and usage permissions for entities, roles or processes.

Signup and view all the flashcards

Attack

An abstract concept represented by pieces of information.

Signup and view all the flashcards

Threat

Any circumstance or event with the potential to cause harm to a target system

Signup and view all the flashcards

Interception

Gaining unauthorized access to an asset.

Signup and view all the flashcards

Interruption

Making an Asset unavailable or unusable.

Signup and view all the flashcards

Modification

Changing the content or value of an asset.

Signup and view all the flashcards

Fabrication

Creation of counterfeit assets.

Signup and view all the flashcards

Vulnerability

A feature or combination that allows an adversary to place the system in a state that is contrary to its behavior.

Signup and view all the flashcards

Intrusion

An activity that does not respect the system’s security policy.

Signup and view all the flashcards

Alert

A description of an attack conveyed by monitoring system parameters.

Signup and view all the flashcards

Security Services

An attack or threat.

Signup and view all the flashcards

Physical Controls

Facility protection,Security guards, Locks, Monitoring.

Signup and view all the flashcards

Technical Controls

Logical access control, Cryptographic controls, Security devices.

Signup and view all the flashcards

Administrative Controls

Policies & standards, Procedures & practice, Personnel screening.

Signup and view all the flashcards

Preventive Controls

Prevent attempts to exploit vulnerabilities.

Signup and view all the flashcards

Detective Controls

Warn of attempts to exploit vulnerabilities.

Signup and view all the flashcards

Corrective Controls

Correct errors or irregularities that have been detected.

Signup and view all the flashcards

Study Notes

Why Study Information Security

  • IT experts need IT security knowledge, similar to how building architects need to know about fire safety
  • Developing IT systems without considering security leads to vulnerable systems
  • IT experts without security skills can inadvertently contribute to security problems
  • Learning about IT security is essential to being part of the solution

Course Objectives

  • Comprehend security challenges in dynamic environments
  • Recognize a range of vulnerabilities and threats
  • Learn proactive security measures for security
  • Improve security incident response and recovery skills

Course Outline

  • Security Fundamentals
  • Security and Risk Management
  • Cryptography
  • Key Management and PKI
  • Authentication and identity management
  • Access control

Assessment Mode

  • Quizzes account for 15% of the grade
  • Labs account for 15% of the grade
  • The midterm exam accounts for 30% of the grade
  • The final exam accounts for 40% of the grade
  • More than 3 absences results in not being allowed to enter the exam
  • Absence in a quiz means that the quiz cannot be retaken

Security Fundamentals Objectives

  • Understanding Information Security
  • Identifying Security Properties
  • Recognizing Threats, Attacks, and Assets
  • Implementing Security Mechanisms

What is Information Security

  • Focuses on protecting from damage or harm
  • Assets needing protection include data files, software, IT equipment, and infrastructure
  • Covers both intentional and accidental events
  • Threat agents include people or acts of nature

Information States

  • Information Security protects information assets from harm
  • Information at rest during storage in information storage containers like electronic, physical, human
  • Information in transit in physical or electronic form
  • Information in processing in physical or electronic form

The Need for Information Security

  • Security problems can't be solved once and for all
  • Rapid innovation introduces new technology and vulnerabilities
  • More activities are moving online
  • Crime follows financial opportunities online
  • Information security is often an afterthought
  • The conclusion is that information security is a continuing process

Types of Cyber Attacks

  • According to Ponemon Institute study of 254 companies:
  • Malware is the most prevalent, affecting 98% of companies
  • Phishing and social engineering affected 70%
  • Web-based attacks affected 63%
  • Ransomware affected 13%
  • According to Arbor Networks:
  • DDoS attacks are a major concern for service providers
  • Infrastructure outages also a major concern for service providers, with a 14% jump
  • Bandwidth saturation is also prominent

DDoS Attacks

  • Volumetric Attacks:
    • Account for 75.7% of attacks
    • Aims to consume bandwidth, leading to congestion
  • TCP State-Exhaustion Attacks
    • Account for 11.8% of attacks
    • Aims to consume the connection state tables of infrastructure components
  • Application-Layer Attacks: Account for 12.4% of attacks
    • Typically target Layer 7
      • Are very effect at low rates

Motivations Behind DDoS Attacks

  • The most common motivations:
    • Online gaming-related (50.5%)
    • Demonstrating DDoS attack abilities to potential customers (49.1%)
      • Criminal extortion attempts (44.4%)

Attack Target Mix

  • The primary target is:
    • Customers at 75%
    • Service infrastructure at 15%
    • Network infrastructure 10%

Attack Frequency Per Month

  • 33% of respondents experience 1-10 attacks per month
  • 14% experience 11-20 attacks per month
  • 13% experience 21-50 attacks per month
  • Only 8% experience less than 1 attack per month

Attack Duration

  • 23% of attacks last less than 1 hour
  • 38% of attacks last 1-6 hours
  • 13% of attacks last 1-3 days
  • Only 4% of attacks lasts longer than 1 month

Application Layer Attack Vectors

  • DNS (82%) and HTTP (80%) are the most common
  • HTTPS accounts for 61%
  • SMTP accounts for 21%

Security Services

  • Computer security definition from NIST 1995: the protection afforded to an automated information system to preserve the integrity, availability, and confidentiality of information system resources

The CIA Triad

  • Confidentiality:
    • Is concerned with secrecy, privacy, and anonymity
    • Main threat is information theft and unintentional disclosure
  • Integrity:
    • Concerns data and system accuracy and completeness
    • Includes authentication and accountability
    • Main threat is data and system corruption, and loss of accountability
  • Availability:
    • Is being accessible and usable upon demand by authorized entities
    • Main threat is Denial of Service (DoS)

Data Privacy

  • Addresses the personal information of natural persons
  • Involves preventing unauthorized collection and use of personal info
  • Ensuring data accuracy and transparency
  • GDPR becomes EU law on May 25, 2018

Authenticity (Security Service)

  • User Authentication:
    • Verifying the claimed identity of a legitimate user accessing a system application
  • Organization Authentication:
    • Verifying the claimed identity of a legal organization in an online interaction
  • System Authentication:
    • Corroborating that a peer entity (system) is the claimed identity
  • Data Origin Authentication:
    • Corroborating that the source of received data is as claimed

Non-Repudiation

  • The goal is to make sending/receiving messages undeniable through unforgivable evidence
    • Origin non-repudiation to prevent that data was sent
    • Delivery non-repudiation to that data was received
  • Digital signatures provide cryptographic evidence
  • Data origin authentication/non-repudiation both supply proof to recipient/third parties

Accountability

  • Goal is to trace actions to a specific user to hold accountable
    • Audit information must be kept and protected to trace actions
  • Common threats:
    • The inability to identify the source of an incident
  • The inability to identify the attacker responsible
  • Useful controls:
    • Identifying and authenticating users
    • Logging all system events
      • Electronic/Digital signatures

Authorization

  • Specifies access and usage permissions for entities, roles, or processes
  • Policies are normally defined by humans, and issued by authority within the domain
  • Management translates to Sys.Admin in IT systems

Identity and Access Management (IAM)

  • IAM phases:
    • Configuration (Registration, Provisioning, Authorization)
    • Operation (Identification, Authentication, Access Control)
    • Termination (Revoke authorization, Deactivate credentials, De-registration)

Security Definitions

  • Attack:
    • An abstract concept represented by varying pieces of information
      • Security attacks resulte from who exploits a vulnerability
  • Threat:
    • Any circumstance or event with the potential to cause harm
    • Include necessary skills, an opportunity, and a motivation
  • Vulnerability:
    • A feature or combination of features that allows an adversary to compromise security
    • A feature or bug enables attacker to bypass security measures
  • Intrusion:
    • Is an activity that violates the system's security policy
  • Alert:
    • Is a description of an attack conveyed through monitoring

Classifying Vulnerabilities

  • Application-level:
    • Operating systems
    • Web applications
    • Database applications
  • Protocol
  • Human-related:
    • Equipment misconfiguration
    • Weak password protection

Security Services and Controls

  • Security Services (Goals/Properties): Implementation is independent and supported by specific controls Example: Confidentiality, Integrity, Availability
  • Security Controls (Mechanisms): Practical mechanisms and actions used to provide security services Example: Encryption, Firewalls and Awareness

Security Control Categories

  • Physical Controls:
    • Facility Protection
    • Security Guards, Locks, Monitoring etc
  • Technical Controls: Logical Access/Cryptographic/Security Devices, User Authentication, Intrusion Detection, Forensics etc
  • Administrative Controls: Policy/Standard/Procedure/Practice, Personnel Screening,Dev/Incident.

Security Controls Functional Type

  • Preventive: Prevent Exploiting Vulnerabilities Through Encyption
  • Detective:
    • Warn of Attempts to Exploit Vulnerabilites Though Intrustion Systems
  • Corrective: Correct Errors and Irregularities like Restoring Corrupted Systems Combination of Controls Ensures People and Technology Operate

Security Countermeasures

  • Proactive: Security Awarness, Training, Firewall, Anti-VirusGuard etc
  • Detective: System Monitoring, Anti Virus IPS etc.
  • Reactive: Data RestoralUpgrades, Vulnerability Mitigation.
  • Compensatory: BackUp Generator and Server Isolation

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser