Podcast
Questions and Answers
What is the primary focus when considering security in today's interconnected computer networks?
What is the primary focus when considering security in today's interconnected computer networks?
- Securing a computer's data based on the security of every computer it connects to. (correct)
- Limiting the number of devices connected to a single network.
- Restricting network access to authorized personnel only.
- Prioritizing physical security measures over digital safeguards.
Why is it crucial for security professionals to understand the origins and history of information security?
Why is it crucial for security professionals to understand the origins and history of information security?
- To predict future cyber threats with certainty.
- To impress clients with historical anecdotes.
- To replicate past security measures without modification.
- To gain insight into the current impact and evolution of information security. (correct)
Which of the following best describes the state of security in the 1990s regarding the Internet?
Which of the following best describes the state of security in the 1990s regarding the Internet?
- Security was based on a well-defined set of formal standards.
- Security protocols were universally adopted, preventing widespread misuse.
- Security was the highest priority due to the interconnected nature of networks.
- Security was generally treated as a low priority in early deployments. (correct)
In the context of information security, why is the concept of balance crucial?
In the context of information security, why is the concept of balance crucial?
What was a key characteristic of computer security implementation during World War II?
What was a key characteristic of computer security implementation during World War II?
What is the significance of the Rand Report R-609 in the history of information security?
What is the significance of the Rand Report R-609 in the history of information security?
What distinguishes the 'bottom-up' approach to information security implementation?
What distinguishes the 'bottom-up' approach to information security implementation?
Which of the following best describes the role of a Chief Information Security Officer (CISO)?
Which of the following best describes the role of a Chief Information Security Officer (CISO)?
Which of the following represents a key element that expanded the scope of computer security beyond physical security in the 1970s and 80s?
Which of the following represents a key element that expanded the scope of computer security beyond physical security in the 1970s and 80s?
Which of the following actions is most aligned with the 'Implementation' phase of the Systems Development Life Cycle (SDLC)?
Which of the following actions is most aligned with the 'Implementation' phase of the Systems Development Life Cycle (SDLC)?
What role did Larry Roberts play in the evolution of computer networks?
What role did Larry Roberts play in the evolution of computer networks?
During which phase of the Security Systems Development Life Cycle (SecSDLC) are blueprints developed and incident response plans created?
During which phase of the Security Systems Development Life Cycle (SecSDLC) are blueprints developed and incident response plans created?
What is a primary objective of the 'Investigation' phase in the Systems Development Life Cycle (SDLC)?
What is a primary objective of the 'Investigation' phase in the Systems Development Life Cycle (SDLC)?
In the context of information security, what does the concept of 'attack' involve?
In the context of information security, what does the concept of 'attack' involve?
Which characteristic of information is primarily compromised when data is altered in an unauthorized manner?
Which characteristic of information is primarily compromised when data is altered in an unauthorized manner?
What is the primary goal of 'physical security' within a comprehensive security strategy?
What is the primary goal of 'physical security' within a comprehensive security strategy?
Why is 'Maintenance and Change' considered the most important phase in the Security Systems Development Life Cycle (SecSDLC)?
Why is 'Maintenance and Change' considered the most important phase in the Security Systems Development Life Cycle (SecSDLC)?
Which of the following best describes the concept of 'security as a social science'?
Which of the following best describes the concept of 'security as a social science'?
Which of the following scenarios highlights the importance of 'possession' as a critical characteristic of information?
Which of the following scenarios highlights the importance of 'possession' as a critical characteristic of information?
In an information system (IS), what role do 'Procedures' play?
In an information system (IS), what role do 'Procedures' play?
What is the main disadvantage of the bottom-up approach?
What is the main disadvantage of the bottom-up approach?
What is the meaning of 'nonrepudiation'?
What is the meaning of 'nonrepudiation'?
What does the term 'Exploit' refer to in the world of information security?
What does the term 'Exploit' refer to in the world of information security?
Which of the following is the initial step in the Security Systems Development Life Cycle (SecSDLC)?
Which of the following is the initial step in the Security Systems Development Life Cycle (SecSDLC)?
In the context of information security, how can a computer be considered a 'subject' of an attack?
In the context of information security, how can a computer be considered a 'subject' of an attack?
How did the focus of computer security change in the 1970s and 1980s compared to earlier times?
How did the focus of computer security change in the 1970s and 1980s compared to earlier times?
What is the significance of the MULTICS project in the history of information security?
What is the significance of the MULTICS project in the history of information security?
Within the context of information security, what does the term 'asset' typically refer to?
Within the context of information security, what does the term 'asset' typically refer to?
In the Systems Development Life Cycle (SDLC), what occurs during the 'Analysis' phase?
In the Systems Development Life Cycle (SDLC), what occurs during the 'Analysis' phase?
What is the primary purpose of performing a feasibility analysis at the end of the Logical Design phase in the Security Systems Development Life Cycle (SecSDLC)?
What is the primary purpose of performing a feasibility analysis at the end of the Logical Design phase in the Security Systems Development Life Cycle (SecSDLC)?
What is the description of Information Security by Jim Anderson?
What is the description of Information Security by Jim Anderson?
Which of the following correctly describes the purpose of policies within information security?
Which of the following correctly describes the purpose of policies within information security?
What was the main purpose of ARPANET in its inception?
What was the main purpose of ARPANET in its inception?
Which of the following is an example of a 'control' or 'countermeasure' in the context of information security?
Which of the following is an example of a 'control' or 'countermeasure' in the context of information security?
What does the concept of 'Communities of Interest' refer to in the context of information security?
What does the concept of 'Communities of Interest' refer to in the context of information security?
What is a characteristic of top-down approach?
What is a characteristic of top-down approach?
What is a characteristic of bottom-up approach?
What is a characteristic of bottom-up approach?
Flashcards
Information Security
Information Security
A well-informed sense of assurance that information risks and controls are balanced.
What is Security?
What is Security?
The protection of information and its critical elements, ensuring systems and hardware usage is secure.
Information System (IS)
Information System (IS)
A component of information systems- Software, Hardware, Data, People, Procedures and Networks.
Logical Design: Business Need
Logical Design: Business Need
Signup and view all the flashcards
End of System's Life
End of System's Life
Signup and view all the flashcards
Chief Information Officer (CIO)
Chief Information Officer (CIO)
Signup and view all the flashcards
Chief Information Security Officer (CISO)
Chief Information Security Officer (CISO)
Signup and view all the flashcards
InfoSec Project Team
InfoSec Project Team
Signup and view all the flashcards
Exploit
Exploit
Signup and view all the flashcards
Attack
Attack
Signup and view all the flashcards
Security Vulnerability
Security Vulnerability
Signup and view all the flashcards
Investigation
Investigation
Signup and view all the flashcards
Methodology
Methodology
Signup and view all the flashcards
Last for product ...
Last for product ...
Signup and view all the flashcards
Is Information Security and Art or a Science?
Is Information Security and Art or a Science?
Signup and view all the flashcards
Rudimentary Security
Rudimentary Security
Signup and view all the flashcards
Mailing Tapes
Mailing Tapes
Signup and view all the flashcards
De Facto Standards
De Facto Standards
Signup and view all the flashcards
Larry Roberts
Larry Roberts
Signup and view all the flashcards
Interconnected Security
Interconnected Security
Signup and view all the flashcards
Rand Report R-609
Rand Report R-609
Signup and view all the flashcards
MULTICS
MULTICS
Signup and view all the flashcards
Traditional SDLC
Traditional SDLC
Signup and view all the flashcards
The Security Systems Development Life Cycle.
The Security Systems Development Life Cycle.
Signup and view all the flashcards
Data Owner
Data Owner
Signup and view all the flashcards
Reasonable access
Reasonable access
Signup and view all the flashcards
De Facto Standards
De Facto Standards
Signup and view all the flashcards
Study Notes
Introduction to Information Security
- Information security is described as a "well-informed sense of assurance that the information risks and controls are in balance".
- Jim Anderson from Inovant, created this definition of Information Security in 2002.
- Security professional must understand the history of information security and how it shapes our current understanding.
The History of Information Security
- Immediately followed the development of mainframes.
- Code-breaking computations was an early use.
- World War II saw multiple levels of security implemented.
- Early security implementations were rudimentary using physical controls.
- Focus was physical theft, espionage, and sabotage.
The 1960s
-
Mailing tapes were used for original communication.
-
The Advanced Research Project Agency (ARPA) was created.
-
The agency examined the feasibility of redundant networked communications.
-
Larry Roberts developed ARPANET from its inception
-
The ARPANET plan included linking computers, resource sharing and linking of 17 computer research centers with a cost of $3.4M.
-
ARPANET is a predecessor to the Internet.
The 1970s and 80s
- ARPANET grew in popularity which increased potential for misuse.
- There were fundamental problems with ARPANET security.
- Individual remote sites were not secure from unauthorized users.
- There were vulnerabilities present in the password structure and formats.
- There were no safety procedures for dial-up connections to ARPANET.
- There was non-existent user identification and authorization to the system.
- Paper R-609, otherwise known as the Rand Report, started the study of computer security which gave birth to current practices.
- The scope of computer security grew from physical security.
- Evolved to include: safety of data, limiting unauthorized access to data, and involvement of personnel from multiple levels of an organization.
MULTICS
- Early focus of computer security research resulted in system called Multiplexed Information and Computing Service (MULTICS).
- The first operating system created with security as its primary goal.
- Mainframe, time-sharing OS developed in mid-1960s included GE, Bell Labs, and MIX.
- Several MULTICS key players created UNIX.
- In the late 1970s, the microprocessor expanded computing capabilities, reducing mainframe presence while expanding security threats.
The 1990s
- Networks of computers became more common.
- Need to interconnect networks grew.
- Internet became first manifestation of a global network of networks.
- Internet was initially based on de facto standards.
- In early Internet deployments, security was treated as a low priority.
2000 to Present
- Millions of computer networks communicate.
- Many of the communications are unsecured.
- The ability to secure a computer’s data is influenced by the security of every computer to which it is connected.
- A growing threat of cyber attacks has increased the need for improved security.
What is Security?
- The quality or state of being secure, or freedom from danger.
- A successful organization should have multiple layers of security in place.
- This includes physical, personal, operations, communications, network, and information security.
- The protection of information and its critical elements, including systems and hardware that use, store, and transmit that information.
- Necessary tools include policy, awareness, training, education, and technology.
- CIA triangle, consisting of confidentiality, integrity, and availability.
- Critical characteristics of information have since expanded.
Key Information Security Concepts
- Access: A subject's ability to interact with an object.
- Asset: The organizational resource that is being protected.
- Attack: An act, intentional or unintentional, that may damage or compromise assets.
- Control, Safeguard, or Countermeasure: Security mechanisms, policies, or procedures that can successfully counter attacks, reduce risk, resolve vulnerabilities, and improve security within an organization.
- Exploit: A technique to compromise a system.
- Exposure: Exists when a vulnerability is known to an attacker.
Key Information Security Concepts: Computer Attacks
- Computers can be either the subject or the object of an attack.
- The subject of the attack involves the computer being used as an active tool to conduct the attack.
- The object of the attack involves the computer is the entity being attacked.
Critical Characteristics of Information
- The value of information comes from its characteristics
- Availability, accuracy, authenticity, confidentiality, integrity, utility, and possession must be considered.
Components of an Information System
- Information system (IS) constitutes the entire set of components which includes software, hardware, data, people, procedures and networks necessary to use information as a resource in the organization.
Balancing Information Security and Access
- It is impossible to obtain perfect security.
- Security is a process, not an absolute.
- Security should be considered balance between protection and availability.
- There has to be reasonable access while protecting against threats.
Approaches to Information Security Implementation: Bottom-Up Approach
- Grassroots effort where systems administrators drive.
- The key advantage is the presence of technical expertise of individual administrators.
- Seldom works and lacks a number of critical features.
- There is a lack of participant support and organizational staying power.
Approaches to Information Security Implementation: Top-Down Approach
- Top-down initiated by upper management.
- There is issue policy, procedures, and processes.
- Dictates goals and expected outcomes of project and determines accountability for each required action.
- Top-Down is the most successful approach to InfoSec implimentation
- Involves formal development strategy and systems development life cycle.
The Systems Development Life Cycle - SDLC
- SDLC is a methodology for design and implementation of information system and a formal approach to problem solving based on structured sequence of procedures.
- Using a methodology ensures a rigorous process and increases probability of success.
- Traditional SDLC consists of six general phases.
Investigation - SDLC Phase
- The investigation phase answers the question: What problem is the system being developed to solve?
- Objectives, constraints, and scope of project specified.
- Preliminary cost-benefit analysis developed during this phase.
- Feasibility analysis is performed assessing economic, technical, and behavioral feasibilities is completed at the end.
Analysis - SDLC Phase
- The analysis phases assesses consist of: the organization, current systems, and capability to support proposed systems.
- Determine what new system is expected to do.
- Determine how it will interact with existing systems.
- The analysis phases ends with documentation.
Logical Design - SDLC Phase
- The main factor in logical design is business need, which dictates the applications capable of providing needed services are selected.
- Necessary data support and structures identified.
- Technologies to implement physical solution determined.
- Feasibility analysis performed at the end.
Physical Design - SDLC Phase
- Technologies to support the alternatives identified and evaluated in the logical design are selected.
- Components evaluated on make-or-buy decision.
- Feasibility analysis performed.
- The entire solution is then presented to end-user representatives for approval.
Implementation - SDLC Phase
- Needed software is created.
- Components are ordered, received, and tested.
- Users are trained and documentation is created.
- Feasibility analysis prepared.
- Users are presented with system for performance review and acceptance test.
Maintenance and Change - SDLC Phase
- The longest and most expensive phase.
- Necessary for support and modification of the system.
- Lasts for product useful life.
- The life cycle continues.
- Process begins again from the investigation phase
- When the current system can no longer support the organization's mission, a new project is implemented.
Security Systems Development Life Cycle
- Has the same phases that are used in traditional SDLC, but needs to be adapted to support implementation of an IS project.
- Identify specific threats and create controls to counter them.
- SecSDLC is a coherent program where actions are not random or unconnected.
Investigation - SecSDLC
- Identifies process, outcomes, goals, and constraints of the project.
- Begins with Enterprise Information Security Policy (EISP).
- Organizational feasibility analysis is performed.
Analysis - SecSDLC
- Documents from investigation phase are studied.
- Analysis of existing security policies or programs.
- Analysis of documented current threats and associated controls.
- Analysis of relevant legal issues that could impact design of the security solution.
- Risk management task begins.
Logical Design - SecSDLC
- Creates and develops blueprints for information security.
- Incident response actions planned.
- Considers continuity planning, incident response, and disaster recovery.
- Feasibility analysis to determine whether project should be continued or outsourced.
Physical Design - SecSDLC
- Needed security technology is evaluated.
- Alternatives are generated.
- Final design is selected.
- At end of phase, feasibility study determines readiness of organization for project.
Implementation - SecSDLC
- Security solutions are acquired, tested, implemented, and tested again.
- Personnel issues are evaluated and specific training and education programs are conducted.
- The entire tested package is presented to management for final approval.
Maintenance and Change - SecSDLC
- Perhaps the most important phase given the ever-changing threat environment.
- Often, repairing damage and restoring information is a constant duel with an unseen adversary.
- Information security profile of an organization requires constant adaptation as new threats emerge and old threats evolve.
Security Professionals and the Organization
- Wide range of professionals are required to support a diverse information security program.
- Senior management is key component.
- Additional administrative support and technical expertise is required to implement details of IS program.
Senior Management
- Chief Information Officer (CIO): Senior technology officer primarily responsible for advising senior executives on strategic planning.
- Chief Information Security Officer (CISO): Primarily responsible for assessment, management, and implementation of IS in the organization, usually reports directly to the CIO.
Information Security Project Team
- A number of individuals who are experienced in one or more facets of required technical and nontechnical areas.
- The team could consist of: Champion, Team leader, Security policy developers, Risk assessment specialists, Security professionals, Systems administrators and End users.
Data Responsibilities
- Data owner: responsible for the security and use of a particular set of information.
- Data custodian: responsible for storage, maintenance, and protection of information.
- Data users: end users who work with information to perform their daily jobs supporting the mission of the organization.
Communities of Interest
- Group of individuals united by similar interests/values within an organization.
- This could include Information security management professionals, information technology management and professionals, or organizational management and professionals.
Is Information Security an Art of Science?
- Implementation of information security is often described as combination of art and science.
- "Security artisan" idea: based on the way individuals perceive systems, since technologists became commonplace.
Security as Art
- There are no hard and fast rules nor many universally accepted complete solutions
- Has no manual for implementing security through entire system.
Security as Science
- Deals with technology designed to operate at high levels of performance.
- Specific conditions cause virtually all actions that occur in computer systems.
- Nearly every fault, security hole, and systems malfunction are a result of interaction of specific hardware and software.
- If developers had sufficient time, they could resolve and eliminate faults.
Security as a Social Science
- Social science examines the behavior of individuals interacting with systems.
- Security begins and ends with the people that interact with the system.
- Security administrators can greatly reduce levels of risk caused by end users, and create more acceptable and supportable security profiles.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.