Professional Documents
Culture Documents
Dr.Nalini.N Professor and Head Department of Computer Science and Engineering Nitte Meenakshi Institute of Technology Bangalore-560 064 e-mail:nalinaniranjan@hotmail.com
Learning Objectives:
Understand what information security is and how it came to mean what it does today. Comprehend the history of computer security and how it evolved into information security. Understand the key terms and critical concepts of information security.
The 1960s
Department of Defenses Advanced Research Project Agency (ARPA) began examining the feasibility of a redundant networked communications Larry Roberts developed the project from its inception.
Safety of the data Limiting random and unauthorized access to that data Involvement of personnel from multiple levels of the organization
The 1990s
The Present
What Is Security?
Identification: An information system possesses the characteristic of identification when it is able to recognize individual users. Identification and authentication are essential to establishing the level of access or authorization that an individual is granted. Authentication occurs when a control provides proof that a user possesses the identity that he or she claims. Authorization:After the identity of a user is authenticated, a process called authorization provides assurance that the user (whether a person or a computer) has been specifically and explicitly authorized by the proper authority to access, update, or delete the contents of an information asset. Accountability: The characteristic of accountability exists when a control provides assurance that every activity undertaken can be attributed to a named person or automated process. For example, audit logs that track user activity on an information system provide accountability.
based on the value of the asset, the likelihood of the loss(the risk), and the number of exposures . This term is sometimes used as a summation measure of risk across various areas of security in an organization. Hacking: Hacking can be defined positively and negatively 1. To write computer programs for enjoyment. 2. To gain access to a computer illegally In the early days of computing, computer enthusiasts were called hacks or hackers because they could tear apart the computer instruction code, or even the computer itself, to manipulate its output. The term hacker at one time expressed respect for anothers ability to make computing technology work as desired in the face of adversity. In recent years, the association with an illegal activity has negatively tinged the term. Object: An object is a passive entity in the information system that receives or contains information. Objects are assigned specific controls that restrict or prevent access by unauthorized subjects. Examples include printers, servers, databases or any other shared resource. Risk: Risk is the ability that something can happen. In information security, it could be the probability of a threat to a system, the probability of a vulnerability being discovered, or the probability of equipment or software malfunctioning. Risk can be measured in quantitative terms, as in a 25% chance of attack or in qualitative terms, as in a low probability of malfunction Security Blue Print: The Security Blue Print is the plan for the implementation of new security measures in the organization. Sometimes called a framework, the blueprint presents an organized approach to the security planning process. The security blueprint is the most significant work produced during the design phases of the SecSDLC. Security Model: A Security Model is a collection of specific security rules that represents the implementation of a security policy. Security posture or Security profile: The Security posture or Security Profile refers to the implementation of security in an organization. It is a general label for the combination of all policy, procedures, technology, and programs that make up the total security effort currently in place and is sometimes called the information security program. Subject: A subject is an active entity that interacts with an information system and causes information to move through the system for a specific purpose. A subject can be an individual, technical component, or computer process. Users, servers, and threads are examples of subjects. Threats: A Threat is a category of objects, persons or other entities that pose a potential danger to an asset. Threats are always present. Some threats manifest themselves in accidental occurrences, while others are purposeful. For example, all hackers represent a potential danger or threat to an unprotected information system. Severe storms are also a threat to building and their contents. Threat Agent: A Threat Agent is the specific instance or component of a threat. For example, you can think of all hackers in the world as collective threat, and Kevin Mitnick, who was convicted for hacking into phone systems, as a specific threat agent. Likewise a
specific lightening strike, hailstorm, or tornado is a threat agent that is part of the threat of severe storms. Vulnerability: Weakness or faults in a system or protection mechanism that expose information to attack or damage are known as vulnerabilities. They can range from a flaw in a software package, to an unprotected system port or an unlocked door. Vulnerabilities that have been examined, documented, and published are referred to as well-known vulnerabilities.
---------------------
---------------------