Information Security vs. Cyber Security

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What is the primary goal of information security?

  • To ensure all data is freely accessible to everyone.
  • To maximize the speed and efficiency of data processing.
  • To eliminate the need for cybersecurity measures.
  • To protect information from unauthorized access, use, disclosure, disruption, modification, or destruction. (correct)

Which of the following best describes the scope of information security compared to cybersecurity?

  • Cybersecurity focuses on physical security, while information security focuses on digital security.
  • Information security is broader, encompassing digital, physical, and other formats. (correct)
  • Both terms are interchangeable and have the same scope.
  • Cybersecurity is broader, encompassing all forms of information.

Which of the following actions is considered an example of 'unauthorized use' in the context of information security?

  • Sharing a company presentation at a public conference.
  • Accessing a restricted file with proper credentials.
  • Using a system for purposes not permitted by the owner. (correct)
  • Making a backup copy of a database for disaster recovery.

Which of the following represents the correct relationship between threats, attacks, and assets in information security?

<p>Threats are potential actions, attacks are carried out, and assets are the objects. (D)</p> Signup and view all the answers

According to the Committee on National Security Systems (CNSS), what does information security primarily aim to protect?

<p>Information and its critical elements, including systems and hardware. (A)</p> Signup and view all the answers

Which of the following goals is NOT a primary focus of security measures?

<p>Exploitation (A)</p> Signup and view all the answers

Which of the following is LEAST likely to be considered a security measure?

<p>Disabling automatic software updates. (A)</p> Signup and view all the answers

What event led to the initial development of computer security measures during World War II?

<p>The need to safeguard mainframes used for computations in sensitive military locations. (C)</p> Signup and view all the answers

In the early history of information security, what was one of the first documented problems encountered?

<p>Accidental exposure of password files due to software glitches (D)</p> Signup and view all the answers

Which factor primarily led to the increased need for computer and information security in modern computing environments?

<p>Networking and interconnection of information systems (D)</p> Signup and view all the answers

What constitutes personnel security in the context of organizational security layers?

<p>Safeguarding authorized individuals within the organization and its operations. (D)</p> Signup and view all the answers

Which component is NOT part of the CIA triad?

<p>Accountability (B)</p> Signup and view all the answers

In the context of information security, what is an 'exploit'?

<p>A method used to take advantage of a vulnerability. (B)</p> Signup and view all the answers

Which of the following components of an information system is often considered the most difficult to secure?

<p>Software (C)</p> Signup and view all the answers

Why are 'people' often considered the weakest link in an organization's information security?

<p>People can be manipulated or make unintentional errors that compromise security. (C)</p> Signup and view all the answers

What type of security attack involves an attacker gaining access to private conversations or transferred files?

<p>Release of message contents (D)</p> Signup and view all the answers

Which of the following is a characteristic of a 'passive attack'?

<p>It involves monitoring transmissions to obtain information. (C)</p> Signup and view all the answers

Which type of active attack involves an attacker pretending to be someone else to gain unauthorized access?

<p>Masquerade (C)</p> Signup and view all the answers

What type of attack is characterized by making a system resource unavailable or unusable?

<p>Interruption (B)</p> Signup and view all the answers

An unauthorized party gains access to information being transmitted across a network. What type of attack is this?

<p>Interception (A)</p> Signup and view all the answers

Which of the following attacks directly violates the security principle of integrity?

<p>Data modification (C)</p> Signup and view all the answers

In what type of attack does an unauthorized party insert false information into a system?

<p>Fabrication (B)</p> Signup and view all the answers

Which key characteristic of information ensures that it reflects the true state without errors?

<p>Accuracy (A)</p> Signup and view all the answers

What is the primary function of the ITU-T X.800 security architecture?

<p>To offer a framework for defining security requirements and approaches. (C)</p> Signup and view all the answers

What is the primary goal of the authentication service as defined by ITU-T X.800?

<p>To confirm the identity of communicating parties and ensure connection integrity (B)</p> Signup and view all the answers

Which security service controls who can have access to a resource and under what conditions, according to ITU-T X.800?

<p>Access control (C)</p> Signup and view all the answers

Which security service ensures that data received is exactly as sent by an authorized entity?

<p>Data integrity (B)</p> Signup and view all the answers

What is the main goal of nonrepudiation in security services?

<p>To provide protection against denial by one of the entities involved in a communication. (B)</p> Signup and view all the answers

What security service confirms that a system is accessible and usable upon demand by an authorized entity?

<p>Availability (B)</p> Signup and view all the answers

Which security mechanism transforms plaintext into ciphertext?

<p>Encipherment (C)</p> Signup and view all the answers

What is the role of a 'key' in encryption?

<p>It is a secret value used by encryption and decryption algorithms (C)</p> Signup and view all the answers

In symmetric encryption, what is a primary disadvantage?

<p>Key distribution is challenging. (D)</p> Signup and view all the answers

What advantage does asymmetric encryption have over symmetric encryption?

<p>It simplifies key distribution. (C)</p> Signup and view all the answers

What is the primary purpose of a digital signature?

<p>To ensure message authenticity, integrity, and non-repudiation (D)</p> Signup and view all the answers

What is the main purpose of Access Control Lists (ACLs)?

<p>To ensure that only authorized entities can access resources (A)</p> Signup and view all the answers

What is the function of hash functions in ensuring data integrity?

<p>To generate a unique fingerprint of the data to detect alterations (A)</p> Signup and view all the answers

What is the purpose of traffic padding as a security mechanism?

<p>To prevent traffic analysis by adding dummy data (D)</p> Signup and view all the answers

What is the main function of notarization as a security mechanism?

<p>To use a trusted third party to validate communications or transactions (B)</p> Signup and view all the answers

What is the primary role of Intrusion Detection Systems (IDS) as a security mechanism?

<p>To monitor and detect security-related anomalies or incidents (C)</p> Signup and view all the answers

Flashcards

Information Security

Protecting information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording, or destruction.

Cyber Security

Protecting computer systems and networks from digital threats.

Unauthorized Access

Gaining entry to systems, data, or resources without proper permission.

Unauthorized Use

Exploiting systems or data for purposes not permitted by the owner.

Signup and view all the flashcards

Disclosure

Exposing confidential information to unauthorized individuals or entities.

Signup and view all the flashcards

Disruption

Interrupting the normal operations of systems, networks, or data access.

Signup and view all the flashcards

Modification

Altering data or systems without permission, potentially compromising integrity.

Signup and view all the flashcards

Inspection

Scrutinizing or analyzing data or systems without proper authority.

Signup and view all the flashcards

Recording

Capturing or storing sensitive information without consent.

Signup and view all the flashcards

Destruction

Irreversibly damaging or erasing data or systems without authorization.

Signup and view all the flashcards

Security

The prevention of certain types of intentional actions from occurring in a system.

Signup and view all the flashcards

Threats

Potential actions that could compromise a system.

Signup and view all the flashcards

Attacks

Threats that are carried out.

Signup and view all the flashcards

Attackers

Those who carry out intentional attacks.

Signup and view all the flashcards

Assets

Objects of attacks; what attackers target.

Signup and view all the flashcards

What is Security?

The quality or state of being secure to be free from danger.

Signup and view all the flashcards

Info Security Definition

Protection of information and its critical elements.

Signup and view all the flashcards

Prevention

Prevent attackers from violating security policy.

Signup and view all the flashcards

Detection

Detect attackers' violation of security policy.

Signup and view all the flashcards

Recovery

Stop attack, assess and repair damage.

Signup and view all the flashcards

Survivability

Continue to function correctly even if attack succeeds.

Signup and view all the flashcards

Technology

Hardware/software used to ensure security.

Signup and view all the flashcards

Policy and practice

Security requirements and activities.

Signup and view all the flashcards

Awareness

Understanding of threats and vulnerabilities.

Signup and view all the flashcards

Physical Controls

Limits access to sensitive military locations to authorized personnel.

Signup and view all the flashcards

ARPA Internet

ARPA began to examine feasibility of networked communications.

Signup and view all the flashcards

Software Security Early

The first documented problem caused by a software glitch that printed passwords

Signup and view all the flashcards

R-609 Report

A paper that started the study of computer security.

Signup and view all the flashcards

Physical Security

Physical items, objects, or areas from unauthorized access and misuse.

Signup and view all the flashcards

Personnel security

Protect individual or group of authorized individuals.

Signup and view all the flashcards

Operations security

Protect details of a particular operation or series of Activities.

Signup and view all the flashcards

Communications security

Protect communications media, technology, and content.

Signup and view all the flashcards

Network security

Protect networking components, connections, and contents.

Signup and view all the flashcards

Information security

Protect confidentiality, integrity and availability of information assets.

Signup and view all the flashcards

Confidentiality

Ensuring data is accessible only to authorized individuals.

Signup and view all the flashcards

Integrity

Maintaining data accuracy and preventing unauthorized modification.

Signup and view all the flashcards

Availability

Ensuring that data and resources are accessible when needed.

Signup and view all the flashcards

Exploit

The method used to take advantage of a vulnerability.

Signup and view all the flashcards

Exposure

A state where a vulnerability is known.

Signup and view all the flashcards

Access

The ability to use or interact with a system.

Signup and view all the flashcards

Asset

A valuable resource that needs protection.

Signup and view all the flashcards

Study Notes

Information Security vs. Cyber Security

  • Information security focuses on protecting information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording, or destruction.
  • Cyber security focuses on protecting computer systems and networks from digital threats.
  • Information security is broader than cybersecurity and encompasses all forms of information, while cybersecurity primarily focuses on the digital realm.
  • Examples of information security measures include data encryption, access controls, and data loss prevention.
  • Examples of cyber security measures include malware protection, network security, and intrusion detection.
  • Cyber security is a subset of information security, as information security is a broader term.

What is Information Security?

  • Information security is the practice of defending information.
  • Unauthorized access means gaining entry to systems, data, or resources without proper permission.
  • Unauthorized use means exploiting systems or data for purposes not permitted by the owner.
  • Disclosure means exposing confidential information to unauthorized individuals or entities.
  • Disruption means interrupting the normal operations of systems, networks, or data access.
  • Modification means altering data or systems without permission, potentially compromising integrity.
  • Inspection means scrutinizing or analyzing data or systems without proper authority.
  • Recording means capturing or storing sensitive information without consent.
  • Destruction means irreversibly damaging or erasing data or systems without authorization.

Introduction to Security Concepts

  • Security is preventing certain types of intentional actions from occurring in a system.
  • Potential actions that security aims to prevent are threats.
  • Attacks are threats that are carried out.
  • An attacker carries out intentional attacks.
  • Assets are the objects of attacks.
  • Security is "the quality or state of being secure—to be free from danger."
  • The Committee on National Security Systems (CNSS) defines information security as protecting information and its elements, as well as the systems and hardware that use, store, and transmit that information.

Security Goals

  • Prevention aims to prevent attackers from violating security policies.
  • Detection involves detecting attackers' violations of security policies.
  • Recovery covers stopping attacks, assessing damage, and repairing systems.
  • Survivability ensures the ability to continue functioning correctly even if an attack succeeds.

Security Measures

  • Technology includes hardware and software used to ensure security.
  • Policy and practice involves security requirements and activities.
  • Education, training, and awareness focuses on understanding threats, vulnerabilities, and how to protect against them.

History of Information Security

  • The history of information security begins with computer security.
  • The need to secure physical locations, hardware, and software from threats arose during World War II.
  • Early mainframes, developed for computations for communication, required multiple levels of security.
  • Physical controls, such as badges, keys, and facial recognition, were implemented to protect sensitive military locations.
  • The first documented problems occurred in the early 1960s and involved a software glitch causing an accidental file switch, printing the entire password file on every output.
  • The Advanced Research Procurement Agency (ARPA) began examining networked communications in the 1960s.
  • Larry Roberts developed ARPANET, which is the first Internet.
  • The 1970s and 80s saw ARPANET grow in popularity with increasing misuse potential.
  • Fundamental problems with ARPANET security were identified.
  • There were no safety procedures for dial-up connections to ARPANET, including non-existent user identification and authorization.
  • Information security began with Rand Report R-609.
  • The scope of computer security grew from physical security to include the safety of data, limiting unauthorized access, and involving personnel from multiple levels of an organization.
  • The R-609 Report first identified the role of management and policy issues.
  • In the 1990s, networks of computers became more common leading to the need to interconnect networks.
  • The Internet became the first manifestation of a global network of networks.
  • Security was treated as a low priority in early Internet deployments.
  • Since 2000, millions of computer networks connected via the Internet, most of which were unsecured.
  • This resulted in the realization of information security, its importance, and its use.

Achieving Security

  • A successful organization should implement multiple layers of security
  • Physical security protects physical items, objects, or areas from unauthorized access and misuse.
  • Personnel security protects individuals authorized to access the organization and its operations.
  • Operations security protects the details of a particular operation or series of activities.
  • Communications security protects communications media, technology, and content.
  • Network security protects networking components, connections, and contents.
  • Information security protects the confidentiality, integrity, and availability of information assets, achieved via policy, education, training, awareness, and technology.

CIA Triangle

  • The C.I.A. triangle ensures computer security through confidentiality, integrity, and availability.
  • Confidentiality ensures that data is accessible only to authorized individuals.
  • Integrity maintains data accuracy and prevents unauthorized modification.
  • Availability ensures that data and resources are accessible when needed.

Components of an Information System

  • Software includes applications, operating systems, and utilities; securing it is challenging.
  • Hardware is the physical technology that houses and executes software and deals with physical security policies protecting it from harm or theft.
  • Data stored, processed and transmitted by a computer system must be protected, as data is often the most valuable asset for an organization.
  • People can be information security threats and the weakest link if policies, education, training, awareness, and technology are not properly employed.
  • Procedures include written instructions; unauthorized access poses a threat to the integrity of information.
  • Networks when forming local area networks (LANs) and connecting to other networks such as the Internet, create new information security challenges.

Security Attacks

  • A computer can be the subject and/or the object of an attack.
  • When the computer is the subject, it is used to conduct an attack.
  • When the computer is the object, it is being attacked.
  • There are two types of attack: direct and indirect.
  • A direct attack involves a hacker using their computer to break into a system.
  • An indirect attack involves a compromised system used to attack other systems.

Passive Attacks

  • Passive attacks involve eavesdropping on or monitoring transmissions to obtain information and are hard to detect.
  • Release of message contents happens when an attacker gains access to sensitive information.
  • Traffic analysis involves monitoring communication patterns to gather information without seeing actual content.
  • Preventing passive attacks is more feasible than detecting them.

Active Attacks

  • Active attacks involve modifying data streams or creating false streams.
  • Masquerade involves someone pretending to be another person or system to gain access.
  • Replay involves capturing and reusing valid data (like login details).
  • Modification of messages involves changing data, leading to incorrect information.
  • Denial of service involves flooding a system to make it unavailable.
  • Detecting and recovering from active attacks is more feasible than absolute prevention.

Types of Security Attacks

  • Interruption involves destroying or making a system asset unavailable.
  • Interception involves unauthorized access to an asset.
  • Modification involves unauthorized tampering with an asset.
  • Fabrication involves inserting counterfeit objects into a system.

Key Characteristics of Information

  • Timeliness ensures information is up-to-date for decision-making.
  • Availability ensures information is accessible when needed.
  • Accuracy reflects the state without errors.
  • Authenticity comes from a trusted source without tampering.
  • Confidentiality protects information from unauthorized access.
  • Integrity maintains completeness and consistency.
  • Utility serves a practical purpose for users.
  • Possession maintains ownership or control by authorized entities.

Security Architecture for Open Systems Interconnection (OSI)

  • The OSI Security Architecture from ITU-T X.800 is a framework that defines security requirements and approaches.
  • The components define security attacks, mechanisms, and services, as well as their relationships.
  • Requirements in X.800 are categorized into security services.
  • Authentication assures that a communication is authentic.
  • The recipient should be sure that the message came from the source it claims to be.
  • All communicating parties should be sure that there is no unauthorized interference.
  • Access Control prevents unauthorized use of a resource.
  • Data confidentiality protects data from unauthorized disclosure.
  • This includes Connection confidentiality, Connectionless confidentiality, Selective field confidentiality, and Traffic-Flow Confidentiality.
  • Data Integrity assures that received data is exactly as sent by an authorized entity.
  • Nonrepudiation provides protection against denial of participation in a communication.
  • Nonrepudiation can relate to Origin (proof of message sent) and Destination (proof of message received).
  • Availability service ensures that a system is accessible and usable upon demand.

Security Mechanisms

  • Encipherment (encryption) transforms plaintext into ciphertext using cryptographic algorithms and keys.
  • Ciphertext is unreadable.
  • Only authorized parties can decrypt using correct decryption keys.
  • Plaintext is the original readable data.
  • The encryption algorithm transforms plaintext to ciphertext.
  • The decryption algorithm reverses the encryption.
  • A key is a secret value and encryption security depends on its secrecy.
  • Types of Encryption:
    • Symmetric encryption utilizes the same key for both encryption and decryption, is fast, efficient, and simple to implement; key distribution is challenging and less scalable.
    • DES (Data Encryption Standard), 3DES (Triple DES), and AES (Advanced Encryption Standard) are examples.
    • Asymmetric encryption utilizes a public key for encryption and a private key for decryption, solves the key distribution problem, and provides digital signatures and non-repudiation.
    • It is slower and not suitable for large data amounts.
  • Digital signatures ensure the authenticity, integrity, and non-repudiation of digital messages via cryptography.
  • Access control ensures that only authorized entities can access resources using Access Control Lists (ACLs), Role-Based Access Control (RBAC), and Mandatory Access Control (MAC).
  • Data Integrity ensures that data is not altered during transmission or storage using hash functions (SHA-256, MD5) and Message Authentication Codes (MACs).
  • Authentication verifies the identity of communicating entities through passwords, biometrics, and two-factor authentication.
  • Traffic Padding prevents traffic analysis by adding dummy data to streams.
  • Routing Control ensures that data is routed through secure and trusted paths with network layer security (IPsec) and secure routing protocols.
  • Notarization uses a trusted third party to validate or certify operations, using timestamping and Certificate Authorities (CAs) for digital certificates.
  • Event Detection monitors/detects security-related occurrences, using Intrusion Detection Systems (IDS) and Security Information and Event Management (SIEM).

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser