Basic Concepts of Information Security



Similar documents
Cryptography. Digital security domain. Digital signature. Problems in digital signatures. Firewall. An open network

Information Security Basic Concepts

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Information Security

EXIN Information Security Foundation based on ISO/IEC Sample Exam

1. Computer Security: An Introduction. Definitions Security threats and analysis Types of security controls Security services

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

DIVISION OF INFORMATION SECURITY (DIS)

SECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES

Notes on Network Security - Introduction

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

How To Secure Cloud Computing

Management Standards for Information Security Measures for the Central Government Computer Systems

STATE OF NEW JERSEY Security Controls Assessment Checklist

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters

Chapter 4 Information Security Program Development

INFORMATION TECHNOLOGY POLICY

CIS 6930/4930 Computer and Network Security. Dr. Yao Liu

Lesson 4: Introduction to network security

Supplier Security Assessment Questionnaire

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Description: Objective: Attending students will learn:

Purpose. Service Model SaaS (Applications) PaaS (APIs) IaaS (Virtualization) Use Case 1: Public Use Case 2: Use Case 3: Public.

(Instructor-led; 3 Days)

Newcastle University Information Security Procedures Version 3

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

ISO 27002:2013 Version Change Summary

Computer and Network Security

Information Security Program CHARTER

ISO Controls and Objectives

Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

FINAL May Guideline on Security Systems for Safeguarding Customer Information

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Overview of computer and communications security

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER


CSC 474 Information Systems Security

ISO27001 Controls and Objectives

Data Privacy and Gramm- Leach-Bliley Act Section 501(b)

Name. Description. Rationale

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

Network Security. Network Security Hierarchy. CISCO Security Curriculum

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

Security Overview. BlackBerry Corporate Infrastructure

Agile Information Security Management in Software R&D

HIPAA Security COMPLIANCE Checklist For Employers

Third Party Security Requirements Policy

Information Technology Security Review April 16, 2012

Nine Steps to Smart Security for Small Businesses

John Essner, CISO Office of Information Technology State of New Jersey

Current and Future Research into Network Security Prof. Madjid Merabti

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

Using the HITRUST CSF to Assess Cybersecurity Preparedness 1 of 6

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Evaluation of different Open Source Identity management Systems

Information Security Classification

CompTIA Security+ (Exam SY0-410)

Principle of Information Security. Asst. Prof. Kemathat Vibhatavanij Ph.D.

Chapter 6: Fundamental Cloud Security

On-line Payment and Security of E-commerce

How To Protect Your Network From Attack

Course mechanics. CS 458 / 658 Computer Security and Privacy. Course website. Additional communication

This is a free 15 page sample. Access the full version online.

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Under the Cybersecurity Law, network operators are obligated to consider the following security

Case Study: Hiring a licensed Security Provider

Introduction to Security

ICT Policy. Executive Summary. Date of ratification Executive Team Committee 22nd October Document Author(s) Collette McQueen

ISO Information Security Management Systems Professional

Managing IT Security with Penetration Testing

1.4 The banking entities that provide customer service will keep controls of access to the premises.

Act on Background Checks

I. Introduction to Privacy: Common Principles and Approaches

Computer Networks & Computer Security

IBX Business Network Platform Information Security Controls Document Classification [Public]

Act on the Protection of Privacy in Working Life (759/2004)

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

UIIPA - Security Risk Management. June 2015

Transcription:

Basic Concepts of Information Security Timo Kiravuo Helsinki University of Technology Telecommunication Software and Multimedia Laboratory Based on slides by: Prof., Dr. Sci. Teemupekka Virtanen

Security, why Protect valuable assets Compliance with laws Meet the customer requirements Prevent breakdowns in production Keep personnel happy Protect own reputation

Confidentiality- Luottamuksellisuus Secrecy of information Who is allowed to know something Bell-LaPadula model A real property of information Classification must be the same every place the same information is processed

Availability Käytettävyys (Saatavuus) Availability of service (information) What is the maximum time delay for getting service Sometimes probability of not losing information Some close areas availability reliability usability A property of the system The same information may have different classification in different systems

Integrity - Eheys The meaning of integrity has changed during time Originally integrity in transactions There must been no partial transactions Now much broader definition Data was correct in the beginning All changes have be legal, accountable and correct Data is still correct Accountability is usually required to maintain integrity

Threat Uhka Something harmful that may happen Possibility to happen is the numerical value of a threat Examples Fire Death of key person Malfunction of hard disk Cracker breaking in IRS comes to inspect the files

Risk - Riski The expectancy of a threat Two components Threat (probability) Damage (amount) Risk = threat * damage

Vulnerability - Haavoittuvuus Weakness in the information system Makes it possible for a threat to occur Increase probability of a threat Increase damage Examples Weak passwords Weak encryption No secondary power supply A backdoor in the system

From Threat to Risk Threat Vulnerability Loss Risk Eliminate risk Minimize risk Accept risk

The Balance between Risks and Costs Total cost Cost of risk Minimal costs Costs of avoiding accidents Costs of accidents Resources to avoid an accident

Data protection Tietosuoja Privacy protection is a civil right in many countries including Finland Restriction on gathering personal information What kind of information From whom How to use information How to protect information Required by legislation

Protocol - Protokolla A formal description of discussion Vocabulary Order of words How to do handshake Between computers, diplomats, companies

AAA Authentication - Todennus Mechanism for confirming the identity of user and integrity and authenticity of information Authorization Valtuutus Who is allowed to do what Accountability Kohdennettavuus It is possible afterward to find out who has made any operations Identification Tunnistus Connects a user to the real person Usually additional authentication is needed to verify the identity

Anonymity - Anonymiteetti An entity can not be identified Protects the privacy of the entity Can still be authorized to perform actions By using e.g. certificates E.g. when you buy something and pay only cash, the transaction is anonymous, but authorized This can often be a design requirement E.g. government systems

Pseudonymity -pseudonymiteetti We can authenticate and entity and connect it to previous occurances, but we can not identify the person connected to the pseudonym E.g. web cookies Using the same pseudonym in different situations can lead to identification of the entity

Non-repudiation - Kiistämättömyys It is not possible for a user to afterward deny an operation he has made Methods Electronic signature Trusted Third Party Time Stamps Accountability may maintain also non-repudiation

Classification Classification Luokittelu Labeling sensitive information CIA-model (Confidentiality, Integrity, Availability) Clearance Luokittelu Classification of users of information

Corporate Security

The Assets Everything required for production Everything valuable All good reputation Investments

Material Production Buildings Machinery Raw material Stocks Valuables Money Art Other investments Cars

People Production Skilled workers Information Databank Reputation Value itself

Information Production Prints Orders Corporate management Plans Customer information Personnel information Investments Databases Compliance Bookkeeping Privacy

Reputation Good manufacturer No malfunctions No faulty products Good neighbor Environmental protection Safe traffic Good employer Safety in work

Security Management Set the goals Define the security level Define the acceptance of risk Define protection principles

Security Policy A high level statement Defines the baseline security Defines the acceptable risk Defines protection principles Basic document

Legislation and security Assets may be protected by legislation An intruder is a criminal and will be punished Special capabilities are guaranteed to protect assets Legislation sets requirements for security

Baseline Security The minimal required security level The procedures to protect others Usually more is required Production Customers Legislation

Asset Management Recognize the important assets Classification

Physical Security Security domains Protection prevents outsiders from intruding Fences, walls Guards Authenticate the insiders Keys, access control Detection Alarms Delay in detection Precision of detection Active response Time to reach the site Amount of strength to prevent intrusion

How much is enough S(Tp + Tg) > Ta + Tt Tp time to go through a passive barrier Tg time to go to the next barrier Ta delay in alarm Tt time for a guard to reach the site

The Goal of Physical Security People in the domain may work efficiently All the people are authenticated All the people are trusted No outsiders to look after Good working conditions Safety Fire prevention Don t prevent or disturb working of authenticated people

Personnel Security Accepts insiders Background checking Prevents accidents Education Preserves motivation Personnel management Personnel lifecycle Hiring, working, firing

Operational Security Job management Enough people Possibility to work in a secure way Safety procedures Safe working conditions Sharing of duties Key persons

Information Technology Security Computer security Communication security Security domains Protection against outsiders Authentication of insiders Notification of intrusion

Security in a Modern Organization Security requirements are part of management The lower level in hierarchy must meet the requirements of higher level The higher level must accept the cost of security Management in each level has to make decisions in security

Security in Outsourcing Security requirements as part of the service Defined in contracts Evaluation, certification Costs are part of the service Service provider has to be able to include the costs in the price

Security Costs Part of normal operational costs Have to take into accounting when calculate the investments pricing products pricing services

Conclusion Security is a prevention of incidents which may cause losses to the organization Security is optimization between losses and costs of protection There are several methods for protection