Information Security Lecture 1 PDF
Document Details
Uploaded by VictoriousFermium
Islamia University of Bahawalpur
Tags
Summary
This lecture introduces concepts of information security, including definitions of security, confidentiality, integrity, and availability. It also covers examples and software tools that help maintain information security.
Full Transcript
Indroducation to Information Security the state of being free from danger or threat. Freedom from threat. In general, security mean protected from risks like loss, damage, unwanted changes, or other hazards. oComputer Security o Protecting information systems from...
Indroducation to Information Security the state of being free from danger or threat. Freedom from threat. In general, security mean protected from risks like loss, damage, unwanted changes, or other hazards. oComputer Security o Protecting information systems from cyber threats. oHome Security o Ensuring safety and protection at home. oHuman Security o Safeguarding individuals' basic rights and freedom. oFood Security o Ensuring reliable access to food. oNational Security o Protecting a nation's safety and interests. oEcological Security o Preserving the environment and natural resources. oCorporate Security o Protecting business operations and assets. oCloud Security o Safeguarding data and resources stored in the cloud. oHealth Security o Ensuring public health and medical safety. Principles of Information Security Confidentiality, Integrity, Availability (CIA) CIA Aspect Meaning Simple Example Keeping Locking files with Confidentiality information a password. private and secure. Making sure data Using checks to Integrity stays correct and verify that files unchanged. aren't altered. Ensuring Using backups to information is Availability restore data if accessible when systems fail. needed. Tool/Software Use CIA Aspect Monitors and controls Firewalls incoming/outgoing traffic Confidentiality Intrusion Detection System (IDS)/Intrusion Detects/prevents malicious activities Prevention System (IPS) in the network Confidentiality, Integrity Encrypts data to protect from Encryption Tools (e.g., AES, RSA) unauthorized access Confidentiality Access Control Systems (e.g., LDAP, Manages user access to resources Kerberos) based on policies Confidentiality Prevents unauthorized sharing or Data Loss Prevention (DLP) Tools leaking of sensitive data Confidentiality Regularly backs up data to ensure Backup Software (e.g., Veeam, Acronis) recovery in case of failure Availability Protects systems from malware and Antivirus/Antimalware Software other malicious software Integrity, Availability Monitors changes to files to ensure File Integrity Monitoring (FIM) Tools data integrity Integrity Patch Management Tools (e.g., SolarWinds Keeps systems updated with the latest Patch Manager) patches to prevent vulnerabilities Availability Distributes network or application Load Balancers (e.g., HAProxy, F5 Networks) traffic to maintain system availability Availability Security Information and Event Aggregates and analyzes security logs Management (SIEM) Systems and alerts Confidentiality, Integrity, Availability Secures communication over public Virtual Private Networks (VPNs) networks Confidentiality Manages digital certificates and Public Key Infrastructure (PKI) encryption keys Integrity, Confidentiality Ensures system uptime and availability by switching to backup Redundancy and Failover Solutions systems Availability Monitors and reports on database Database Activity Monitoring (DAM) access and actions Confidentiality, Integrity