Information Security
Total Page:16
File Type:pdf, Size:1020Kb
INFORMATION SECURITY Information Secuirty This text is disseminated via the Open Education Resource (OER) LibreTexts Project (https://LibreTexts.org) and like the hundreds of other texts available within this powerful platform, it freely available for reading, printing and "consuming." Most, but not all, pages in the library have licenses that may allow individuals to make changes, save, and print this book. Carefully consult the applicable license(s) before pursuing such effects. Instructors can adopt existing LibreTexts texts or Remix them to quickly build course-specific resources to meet the needs of their students. Unlike traditional textbooks, LibreTexts’ web based origins allow powerful integration of advanced features and new technologies to support learning. The LibreTexts mission is to unite students, faculty and scholars in a cooperative effort to develop an easy-to-use online platform for the construction, customization, and dissemination of OER content to reduce the burdens of unreasonable textbook costs to our students and society. The LibreTexts project is a multi-institutional collaborative venture to develop the next generation of open-access texts to improve postsecondary education at all levels of higher learning by developing an Open Access Resource environment. The project currently consists of 13 independently operating and interconnected libraries that are constantly being optimized by students, faculty, and outside experts to supplant conventional paper-based books. These free textbook alternatives are organized within a central environment that is both vertically (from advance to basic level) and horizontally (across different fields) integrated. The LibreTexts libraries are Powered by MindTouch® and are supported by the Department of Education Open Textbook Pilot Project, the UC Davis Office of the Provost, the UC Davis Library, the California State University Affordable Learning Solutions Program, and Merlot. This material is based upon work supported by the National Science Foundation under Grant No. 1246120, 1525057, and 1413739. Unless otherwise noted, LibreTexts content is licensed by CC BY-NC-SA 3.0. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation nor the US Department of Education. Have questions or comments? For information about adoptions or adaptions contact [email protected]. More information on our activities can be found via Facebook (https://facebook.com/Libretexts), Twitter (https://twitter.com/libretexts), or our blog (http://Blog.Libretexts.org). This text was compiled on 09/27/2021 TABLE OF CONTENTS 1: INFORMATION SECURITY DEFINED 1.1 INFORMATION SECURITY 1.1.1 INFORMATION SECURITY VS CYBERSECURITY 1.1.2 INFORMATION SECURITY VS NETWORK SECURITY 1.2 THREATS TO INFORMATION SECURITY 1.3 MODELS OF SECURITY - CIA / PARKERIAN HEXAD 1.4 ATTACKS - TYPES OF ATTACKS 1.5: VULNERABILITIES 1.6: RISK 1.4.1: RISK AND VULNERABILITIES 1.7: INCIDENCE RESPONSE 1.8: DEFENSE IN DEPTH 2: AUTHENTICATE AND IDENTIFY 2.1: IDENTIFICATION 2.2: AUTHENTICATION 2.3: AUTHENTICATION METHODS - PASSWORD 2.3.1: AUTHENTICATION METHODS - PASSWORD (CONTINUED) 2.3.2: AUTHENTICATION METHODS - BIOMETRICS 2.3.3: AUTHENTICATION METHODS - SECURITY TOKENS 3: AUTHORIZE AND ACCESS CONTROL 3.1: WHAT ARE ACCESS CONTROLS? 3.2: ACCESS CONTROL - ACL 3.3: ACCESS CONTROL - MODELS 3.4: PHYSICAL CONTROLS 3.4.1: PHYSICAL CONTROLS (CONTINUED) 4: AUDITING AND ACCOUNTABILITY 4.1: ACCOUNTABILITY 5: CRYPTOGRAPHY 6: COMPLIANCE , LAWS AND REGULATIONS 7: OPERATIONS SECURITY 8: HUMAN ELEMENT SECURITY 9: PHYSICAL SECURITY 10: NETWORK SECURITY 11: OPERATING SYSTEMS SECURITY 12: MOBILE, EMBEDDED, AND INTERNET OF THINGS SECURITY 13: APPLICATION SECURITY 1 9/26/2021 14: ASSESSING SECURITY BACK MATTER INDEX GLOSSARY 2 9/26/2021 CHAPTER OVERVIEW 1: INFORMATION SECURITY DEFINED 1.1 INFORMATION SECURITY 1.1.1 INFORMATION SECURITY VS CYBERSECURITY 1.1.2 INFORMATION SECURITY VS NETWORK SECURITY 1.2 THREATS TO INFORMATION SECURITY 1.3 MODELS OF SECURITY - CIA / PARKERIAN HEXAD 1.4 ATTACKS - TYPES OF ATTACKS 1.5: VULNERABILITIES 1.6: RISK 1.4.1: RISK AND VULNERABILITIES 1.7: INCIDENCE RESPONSE 1.8: DEFENSE IN DEPTH 1 9/26/2021 1.1 Information Security Information Security Information security, sometimes shortened to infosec, is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or at least reducing the probability of unauthorized/inappropriate access to data, or the unlawful use, disclosure, disruption, deletion, corruption, modification, inspection, recording or devaluation of information. It also involves actions intended to reduce the adverse impacts of such incidents. Protected information may take any form, e.g. electronic or physical, tangible (e.g. paperwork) or intangible (e.g. knowledge). Information security's primary focus is the balanced protection of the confidentiality, integrity and availability of data (also known as the CIA triad) while maintaining a focus on efficient policy implementation, all without hampering organization productivity. This is largely achieved through a structured risk management process that involves: Identifying information and related assets, plus potential threats, vulnerabilities and impacts; Evaluating the risks; Deciding how to address or treat the risks i.e. to avoid, mitigate, share or accept them; Where risk mitigation is required, selecting or designing appropriate security controls and implementing them; Monitoring the activities, making adjustments as necessary to address any issues, changes and improvement opportunities. To standardize this discipline, academics and professionals collaborate to offer guidance, policies, and industry standards on password, antivirus software, firewall, encryption software, legal liability, security awareness and training, and so forth. This standardization may be further driven by a wide variety of laws and regulations that affect how data is accessed, processed, stored, transferred and destroyed. However, the implementation of any standards and guidance within an entity may have limited effect if a culture of continual improvement isn't adopted. Definition Various definitions of information security are suggested below, summarized from different sources: 1. "Preservation of confidentiality, integrity and availability of information. Note: In addition, other properties, such as authenticity, accountability, non-repudiation and reliability can also be involved." (ISO/IEC 27000:2009)[3] 2. "The protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability." (CNSS, 2010)[4] 3. "Ensures that only authorized users (confidentiality) have access to accurate and complete information (integrity) when required (availability)." (ISACA, 2008)[5] 4. "Information Security is the process of protecting the intellectual property of an organisation." (Pipkin, 2000)[6] 5. "...information security is a risk management discipline, whose job is to manage the cost of information risk to the business." (McDermott and Geer, 2001)[7] 6. "A well-informed sense of assurance that information risks and controls are in balance." (Anderson, J., 2003)[8] 7. "Information security is the protection of information and minimizes the risk of exposing information to unauthorized parties." (Venter and Eloff, 2003)[9] 8. "Information Security is a multidisciplinary area of study and professional activity which is concerned with the development and implementation of security mechanisms of all available types (technical, organizational, human-oriented and legal) in order to keep information in all its locations (within and outside the organization's perimeter) and, consequently, information systems, where information is created, processed, stored, transmitted and destroyed, free from threats.Threats to information and information systems may be categorized and a corresponding security goal may be defined for each category of threats. A set of security goals, identified as a result of a threat analysis, should be revised periodically to ensure its adequacy and conformance with the evolving environment. The currently relevant set of security goals may include: confidentiality, integrity, availability, privacy, authenticity & trustworthiness, non-repudiation, accountability and auditability." (Cherdantseva and Hilton, 2013)[2] 9. Information and information resource security using telecommunication system or devices means protecting information, information systems or books from unauthorized access, damage, theft, or destruction (Kurose and Ross, 2010). 1 9/26/2021 https://eng.libretexts.org/@go/page/45653 Overview At the core of information security is information assurance, the act of maintaining the confidentiality, integrity and availability (CIA) of information, ensuring that information is not compromised in any way when critical issues arise. These issues include but are not limited to natural disasters, computer/server malfunction, and physical theft. While paper-based business operations are still prevalent, requiring their own set of information security practices, enterprise digital initiatives are increasingly being emphasized, with information assurance now typically being dealt with by information technology (IT) security specialists.