cw3ssi- Data and Trjornation aay
Ut -T - Treeductisn
\e Histon:
How Moakorre stor 2
Boe Thontis wos the one iho inverted
Ane fer Comput Vieus te 1941 He wb
oyten Yejened 2o 46 tne "yacwer 3 malware”
The pera Compan virs coltigh "Cretper '.
3 (hs muntion yeas nor % conse
hain but VOther #2 Rtrmonstrate “ix
Porssloibiby y AG vrepitoating code. The
Atty - vepltcating Cote Could be Vetta any
pov did thjorrnation Secuney HOD ?
Tnyownabinn Security has tis yout. 20
ancient ceWingations, woth evidence, oO}
encryption Ard Aecture corotount cation
reeebeocts dosing back, fe:
lL. Anefent Musopotemta (3005 Be) ; Clary
tabs Ved for A&cture Communteatio,2. Anckent Equpt (toe Bed: Htewog ly potas wise
yor encwyption
Ancient Grrecce (S00 Be): Crear
communication.
3 ciprey Wea
fer FEO .
ye Ancient Rome (100, Be): omypte Fagin) sed
per retinue communtcations.
In
prtroamly jecued oO:
t phrpstcak pecunity : Proveeting,
recowts and massages from Pryenk Sept
or torapering,
cary period, tnjormation Security, tone
cotter
2 Enon ption: using cots and ctphers 2
Commun
chano
a Sec akin : vay mnsenyens
es td provect
and PROSE
gayermation An trom’
apse, coaty tomes 9 Bnyormeation Aeurny
. foundation jer reokiyn fn yormakien
ch continu, 25 evolue
praction, wih
fn peclnnkogy and
Jota the
peony
wa aavancennets
enenging threats,Whar is Seeurtty ?
Th qamnah, Seourtty te Aired as "the
ox Ato oy betng pecure ~ te be
pre’ pron dandert
Security often achiomes bY Mons OF
Armerat Atroua gts meats: undevbaPen
Senuttancouly ov Used £n Combination
with one Anvther-
Spectartned Arreas ce Secunia
Le Prysiaak Seountty, Lontoh eneomparics
Statrgie fe promt people, phystcat
Oth and fhe workplace prom vayfouy
thaveats | Yor, Unawtneriged acess
Or ndtienral Peasteny.
2: Operctlions secunity: whteh joc on
Aecuning tae Mantnyation’, Ailey fo
care) aut ws operational Octirtiny
vottrout interruption OY Compromtie,
2 NetuSprie security ; wht oh adaryesses
Ye Proetion of an oaningation's data
}
mnetonxtesng ev cos , Connection, £& Conten bsana Pre FLY Ao Use thet neticorie
fe accomplish Pha AF wingation'’s data
Commo ut cation junctions.
4: nyprmation Security; Andudes the lea byoay
Areas oy Zoporrnetion secu management,
Comapubr & eta aaa & hetooyk
hectares.
Where “t hax lbeen Used:
Lo Gourrerents, retro, franckal
Aevtitixbion, | hospitals & private bysinresses,
2. Probecting Congiden tiah Lojormition
ia a bueinise rearivernenk -
Aspects 9 securly : 3-Teoportant Aapects 3 Typos
1 Seeuntty Attocie:
noting acon ie copioroiea sts
Arcunty dD) Engormation Oroned by on
oxpntegation,
S Seouaty attacks or o 2~by pes
Possiue, anace
- Acti, altacePassive tack *
Posstur Attack is a ey pe Y obtacte
Lonere An ANAcke, Lotercepts 4 obseruey
Communication betrven 150 partis
without modtpying ov atkextng tre . data
being tranemiitted. The Gok by Parsi
attack & to geri Eqyp cmation SUCM' AS
+ Eavesdropping x Lovexcep Bing & Parenting
bo Captuye sensirtie Tnpormation
. Wiretapping + en Tver eepti nc) Phone | DY
Tnremet Corerauntcadions.
. Morttoving fe Poaeiing communteation
patterns te tnjer tnyoreration.Ache attacte:
Dele a Aype op abtacle Where An
artacker oot only intercepts but also
moodipies or alters tha Commtnt cation
penecen poe ports -
The goat actin, attack 6 be:
. od data> Altey the Contenbs oy the
_Dasere data i Add roaticious data te
tht Cormmuntaation
+ Delete data. Remove | detete parts 3 meg,
+ Tmperéonati:- Pretend to be One oy the
Comm unicaliionn , partis.2: Seawrity Mectrasiern :.
A procss Prat is destqned es
denet , prevint or Yeeouer from @&
2 Lecuriby Service :-
A Pproeessin. OY Comomunt cabion
Apvice that enhanes the aoc oh
van Gata Processing Aypbeme and The
Anyorrating transfers Oy an organingation.
Tre gevies We Intended to County
aocuriey arattes, Ord Bey mate, 62
of One OF rote Security mechanis me
JP provide thre Service-J} Wrar ie Unyprmation seounty 2:
Tnjorrrdlion security is Une practice O
protecting Aersitug Injormatlor pom
unaenoringed Ccens, Use, disclosure ,
dbvuption, pandityrcabion ov aeruction, TE
fevers ensuring Bae Conpdentiality ,
Borveg ty ane orditabuily oy feyormation,
oe sett ab provectin, agate Vart ous
treats Od vrubnerauritars:
Tayorration Security (Inyo see) 2nvelws
yorious NuOsUTH, sactuadtng |
J. nereoor? Scouts
2: crypregraphy
2. ACCS Convo le
va geoundy OMDORLN AS raining
s Riale raanage rent:
The gqooe o% Enyornakion secunthy te
probeee pensttius tojprmation prom Vento Li,
threats, puch aS Ofer wtacks, phrysccah
thet or human trror And ensue ,
busthess conbinutty.ex TN
VEO 2 Oe a I Ot
b .
va qatrtcal Bronachflytic 9 aiyraes
The homacorintics Enyorrnatcon ate |
. conpiabaualitey ; |
-Detiqgihy
2+ AvoiLaunnil
< Prtyoey
+ Tdentification .
+ Auithertication .
yp 8 Aerovtngation
jouw + AccountawWiky
Be ACER
wom
. Porton.
Lcongidentiatity
congdentialty oy Ragownation ensuyes
who onlay dose with auggicenk Privileges
oy acerss cortain injornenation. Loken
wrprtoged Uedividuiala ow eupeterns
can occedd tngor roagion , conptotentratity be
preached To provece Une Coote clin Ha tite,oy Lajormnadban , & nurolbey of Mreaeues
one weed: . :
- Tryormation Clans’ Reation
« Setiuve Soturnent storage - ;
+ Application of generah Security policies
+ Eduction 9 i thyormation custodians |
Bend wers Exampk, & Credtt core
pramadion on the Totrneh |
“The Suter CUtEmpe bo enjeree ee
by encrypting the card OUmber aang
Eransm'isston, by Sie th Ve places where
te. might appear (ia darabase, 40g, fis,
baceups , PRnkd aipt «< So oA) ana by
restricting access tO ~ places where te
‘e Stored.
Grving out Congictentta Angormatic, ouey
Vee tettplhone uw a breach a congctential|
iy Phe can be net Quttnovinged to hee |
phe Injorrnation, TE eotd reertte in a
breach Congicten tiakety.Trteqrity te
a Trbegaiby means Pheu: den. Cannot be
modifies without athovnation,
Ex: Trreqby fovelus is vintatg
when an “ernployee, Aetetes Ero portant
dara +4, when a compter Virus to fects
CO compurr , whee ao, enoployer ig Able to
raoctihy) Le O98 ahasr4 In & pare
databare, UF S on.
Ds A vailadnety ,
* Fox oar tnyorenation i we see
its purpose, the Tayormatiog Must bbe
oradlabl. when th in Meck.
~ Exaenple : nigh avalitatnbely auetanns
avellave at at tines,
Qin, © ~ernain
presianting cerita | fisvuptions due to
povoe outages ,, PAXOUSENS yatlites ans
Bygiern [Link].POPs
The topornation Vio | ia cethctid, Urea
ana stored ey, an Sxqantrigation ts) be
be Uses only fOr the purposes Stated.
ei deta Dune, at bas tmni tt :
¥njormration ott be
vised only th wees lenowe te Mie pessoy
providing te) _
Dotentigication:
An Yopormation systuno Porserics Phe
Anorractinist®e op aunbigcation whén Te *
Ak. fo yecognings foatrrauak Users:
Totenrtpt cation & authentication Wwe
te Rouel OF
covketrd (means bhe
wserrial be FararPishing
aces or ante ningation trat an todtadual
ia Granted : ’ -
Awe cation: , .
Dr eccurs when a contsek, Provides
Prooy brat aq Wer posseries “Ure iehentity
Wat he | she clotms.A wthovthyation .
Avex Ure Tclanlty yO Wet us
anthenttcabtid , 4 cess CAL author 7
provide acuranc, Wat tre User (tohérhey
a persoo / compute) has beer. epectfeatly,
ane exxprttly authovinged bi} Me proper
fe access, update, or ctelete re
abhor
conn op & Snyormation asset -
Accosnbability ; ,
Pe tancctinistic Of occountabiity
sh When o contred providis Os Lurene.
paar Mery actinity undertoken C@n be
Atari buted wm a named, pyson
ontematid prdeoss
Por exdrople: Ludi dogs ear brace
wee aw on an Baporenation auprienn
provde accoun taki. .
or
3 ACeEey :
Dafox con YOR aecrarcacy when tr is
from murates OF UnDYs. ano ftVeh iey
Toyprneation has Volur whine Serues
a portt ontar piixpose- This mans Phat
uy Enjoanaition “ts awaitake aoe
A format raeantng pul ts a -~ ae
Tp ue nor sept: “Pio i *
tnjorenation cepends On The DPE).
Porsresidn :
Tr & vee Quatity or aban o}
having, ownechtp oF ceil, Jay, apes
defect oc tem.
ja. N8TISSC security Medes :
» Nattonal a "FebeninnesietibanlhS:
we ato aflame Sey Came
suns’ yabiorak Tvabsing Sandava, JP
Layorration coor Pepin.. Bvaluafion Arandars) for. the Aectity
op Eojormalion -Gystena
+ WSTissc wos developed by Mc Guro ber _
McCumber Curbe
CThe NSTISSC moods Comrs the "aren oener te
by Enjorrrattion seauily it ore checuséion
o Aerated quiditines and priteirs tak dircct
the 2mplementation o} control.
«This capt’ provtdin a. more, Mbsid
parepsctine on gcc
LTH iyeabknss op Using ton
poo Uinttud an approach & fe
a Sage Perspectore:
as op eo? axis become
_ The 3-giminsio
] , ©
3 cube With 24 certs ep as
atas that must bbe aabirewsess bo sectuntliy
podany* tnyprrnation Spims.
— To emeure ysitm apy Decay ,
saan ay Ys Bealls mya be Prpeny
acayesed oar tne society process.
For
Be componants hoe 4% OWT Aeclutiy
rregniae men’s:
SOftwore + ;
cuyite o DS comps:
z@ assorted
LThe Soptware COMPO’
appt catios, opreoting ae
Command. utilitits.
.g programs ane Oyen oreaked Urder
sre derranaieg conatrolints 9} Projet
o- Sankt time, Cost and
memginnt , whith Aientt ’
Manpower:
Havdvore +
Haxdwore o& the physical bectinotogy that
hours & Loerie, tee Adprwoorne, ArOrA Ord
Commis rhe data & procs VHtenjacs forUne entry 2 vermovak 0) fojormation }rom the
| aye
i » prnystoah prowrny prttcis aeals vot hh see
wa phygsteal Ovek ana wer the protection
Oy Tse prgical Ome from harm oF Myt-
cag XScation 0} computers
. Secrning, Dae phust
els ws Eraportat
ana the computers Chem
becaue a breach 0} prnyeto prone can
rele En a Rots Os ingermation
Data:- :
. Dara stored | proexed and transmitted
yhwough o computer system most: Be Probected.
+ pata % oxen tay most vawable aer™
possessed by an orgpteyption 2X Pre natin
target 0} mawmolioral Attacks: /
whe Yow, vnorgrerings , chdonee ( Seperety,
eeioted) porenviatly vaepul facts « Pywres
tab—ane Jatty protsed (reaniplatrd) te
Produce in pormation. : :
People: : ; i
TTreve are trany vous 0} people tn njowsgt
Augtims: Coramon One Pack .
~ Systm Arolyst 'eIPNES ronmo
_oTechnictan
Seas :
— Network Maracey
—Ppata eri) Operator: '
Preceduys:
A procdune 6 A) 2X78 0} clocurentid
actions tatan se ache Baceaties A Proceeds
% rnore than aiBtraple Apse « A procedure can
be guit compl £ Myelid , such PeXfprrning
a kacenp , abutting down a system , patching |
Networks:
eWhen Myormation ystems ON conrctud_ to
tacdh other bo form Local Arta Networte (LANs)
ard thie LAN, One commecttd PE OThey netoore,
Suu as Lriemner, “ew fiechisny CraMenges
= Stops to provi networle Arourdhy one.
tenplerrentation oy alanry
women 4ysem
|
|
|
|
ShANEAL os te Pee |
ara februsion Aysterns EO
Owners QrooKre F onqorrg Connprondvses «"5 Secuying he components:
| Seountng Ure component Boyes
\ protecting bing Cornponiks from porential © Otte
ond ebuse by Unariticningedt vers
+ Surpect 4 an artack:
Computr fy Wied AS On Octinn tof
fo Conduct the attack.
fo Ober | On abtack:
Compu itaely ds the enti being
otackid
Two types of attactes
1.) Direct’ attevete :-
a-Indirect attack’
CNS
There |
Hates Using A
Comnputtuy os the iB nce Speen that
Sayect y an ve the object 9,
an attack,
onare :
Eq: Compuny 4S the Arebjece Sate
" F an attace.be Ditvect, attacks :
when a hacker se his persona
computer be bveaie Moto a Aujstam: (originale
prom bie, Caveat: Frrsth)
2+ Encivece attack, :
wher a Syste ve ‘comprorn week ans) ie
Ap attack OUney Ayam: Covegtnate kom
Q system ov yesourer Wat feaey has
been Attacted, and is matpunctioning
or working Under me corbyet OH threak )
A computer can therefore Pe beth
We subset 2 object aA an oma
we ob pers te Sheet & an
comprom Weak arn wed
Loken
yer eovara pe
altace oA tan
to attacte omer usted , ak which potrt
de peemenes Aha sibject oY on attack.
Mb Balancing, fo yoxreatron pecunttiy and access:
LIy as “deoporstiol 46 ovtoin perject .
sstecurnitny — te wnt en absrtute 5 16's & Process.
+ meourity shouts be constdurg a balance
between Prtection ans aveitarntity. »
+ To aefiene batanee, sre Feet g Ager.
must atfou reasonable a
couse, Yet Protetogpins toveats
| Approaches ge BOOrrnalion ecurety trop -
i . : , — lon :~
t {LD Betton - Pp appreach
G> Top- don ‘approach
JBvttcen wp Appreack: ,
° secures from 2 Oprass ~ yOO> Ofjore ~
Sysieens Adminstrator | Otten pt oa én prose
ee pecurreky Oy Phin syste. .
Ms boy ANON AGE — technical expertise 3.
bre Tratvidual adeninistrators:
“Tp cchteue ‘balance, Lae teat op
Aecunite must, allows sreaspnable ,
yet provect against, threats. .
3) Top- down approach: ,
+ Detttakd by Upper managernenp .
ose potter, procedures 2 processes
~dctat te goa and expected Orettonies
O bhe pproeerses. project :
~ determine Who 1s Accountable for
cach by Ure veapitred ackions.+ This approach has strong upper management
“aepoee v, a dedicattd Champion , Haicard
pending | clean \ PRanitng ‘ane the Chance bo
Pnylrence ord anizationad criltere>
+ Ma) Also foveue a jormal Arartopment
Abrategy vejerred ‘ip ae. a aysbems
dlemulopraent Etje cycle:
Top-dnon Ofpoacs Berisen as
Ft4 Approatus To ‘Securd
Aropitnentalioni |. SDLe: Systenos Demetoprnent L tye ey ete
| SDie Loatinzatt Methocrotegy :
{ + SPLE He cx enetioctetagqy for Phe tesin
asd Peng hernaniteion oy, an Bo sprreation
Arpier in An evaanimation ,
+ Thi methodology ds a format
Approach, ae & problem based 07 a |
Atria) tequence OF, Procedures, ; |
+ Qpre Com oy & Plascs:
wo Zoyesriqartion
To's ia. rode Arnpovtant phase et
begins ust An examination of Me eveqk
pr plan, that initictes the ' process.
During vais Bhase, Mae objectives ,
Consrraints & Atope of, tae project We
Aprcifed
Ak tae Conetudion 4 Pays phase, a '
peastetlary analysis te Perjormet, Lobtch
oases Yae economic, bechntcar e behavioral
pastoi ites op he procs @ ersitres hati
i
{
Acopumentation is worth ve org aning tion's
Bene & export.
{I Arabepsic:
Ee begins volt Phe injormation Pima
during the investigation’ Please!
‘Te condi gy anesemen Capastity oy the
orqanination: Vie .sratis ©) Curent Systems,
ana the —— to Atéppovt the Proposes
Svisterns « \
+ Anakysto begin My Atbarnintrs what The
new system in eocpectta te de, & how it
wit forevact with scdiating system -
2 This Plrase, 2rcls witty Pie Apcumenteilion
Oy, yas, yenaenas Zan nivel. Hank aaih bob,
anolipsis. :
fi) Logteat design:
+ Do this phase, fopforrabinn Jotnest frdm
oy aalysle phase He Used So Fagin’ Creatin
Seton por a bistness —prebiem.
a eyetons
Based O1 Me bustness eed , appiteations
ane selected Drat Are Capable oy ProvictingSESE sr mw
needed Atrvicrs.
+ Based 00 the appt cations Needed, data
Aupport & Structures capawde Op Provicting
Dre needed dinpite 4 Phen chosen.
«In, thie phase, ocabiysts gensnae a aumber-
“Oy aAltanatine Avluons | ent with correapeneline
atrengtn & Utakrerns & cost and benistts.
2 At Une end ny Uhis prose, another
peasibilit analysis ig Perjorracd »
iy) Phupstaat! deat:
+ Tn this Phowe, apectpic bechinglarytis We
Aerated be support te solutions cteueloped
in Bae hogical design.
o The Aelictad Components awe Aruakd
based on A make ~ ove busy Ceciston :
eFteal duaigns éoteqrati various |
components Gnd bechnotagis:
v) Troplernent ation ;
+Tin this Prove, aor Meeded | SO5tLoore ly
Crean.
o Components Arne ovctered, Teceited @ bested.= Afterwards, users ME trained & SHERRY
documentation. reared -
+ Once alt’ the Coroponente ‘ane tested Bodtvidua
od
rey axe wstatted & bested as A Arpstern-
Agen Oo peastiitiny Onabyds ls Prepared
ond Une Spoor On. then PYesented LOvbh
Tae system fev a Performance “Yeviews &
acceptance best:
vi) Maintenance & range: \ a | '
Tt is Mat Longest And most eatpensina
prose op Pie process.
~Ir comms Of the tele Necessary &
Aupprt ome rrodify the