SlideShare a Scribd company logo
1 of 13
Information Security
Principles and Practices, 2nd Edition
Dr. Cindi Nadelman
New England College
Chapter 2: Information Security Principles of
Success
*
© Pearson Education 2014, Information Security: Principles and
Practices, 2nd Edition
*
ObjectivesBuild an awareness of 12 basic principles of
information securityDistinguish among the three main security
goalsLearn how to design and apply the principle of “Defense in
Depth”Comprehend human vulnerabilities are security systems
© Pearson Education 2014, Information Security: Principles and
Practices, 2nd Edition
*
© Pearson Education 2014, Information Security: Principles and
Practices, 2nd Edition
*
Objectives (cont.)Explain the difference between functional and
assurance requirementsComprehend the fallacy of security
through obscurityComprehend the importance of risk analysis
and risk management tools and techniquesDetermine which side
of open disclosure debate you would take
© Pearson Education 2014, Information Security: Principles and
Practices, 2nd Edition
*
© Pearson Education 2014, Information Security: Principles and
Practices, 2nd Edition
*
IntroductionBest security specialists combine practical
knowledge and technical skills with understanding of human
natureNo two systems or situations are identical, and there are
no cookbooks to consult on how to solve security problems
© Pearson Education 2014, Information Security: Principles and
Practices, 2nd Edition
*
© Pearson Education 2014, Information Security: Principles and
Practices, 2nd Edition
*Given enough time, tools, skills, and inclination, a hacker can
break through any security measureSecurity testing can buy
additional time so the attackers are caught in the act
Principle 1:There Is No Such Thing as Absolute Security
© Pearson Education 2014, Information Security: Principles and
Practices, 2nd Edition
*
© Pearson Education 2014, Information Security: Principles and
Practices, 2nd Edition
*All information security measures try to address at least one of
the three goals:ConfidentialityIntegrityAvailability The three
security goals form the CIA triad
Principle 2: The Three Security Goals Are Confidentiality,
Integrity, and Availability
© Pearson Education 2014, Information Security: Principles and
Practices, 2nd Edition
*
© Pearson Education 2014, Information Security: Principles and
Practices, 2nd Edition
*Protect the confidentiality of dataConfidentiality models are
primarily intended to ensure that no unauthorized access to
information is permitted and that accidental disclosure of
sensitive information is not possible Preserve the integrity of
dataIntegrity models keep data pure and trustworthy by
protecting system data from intentional and accidental
changesPromote the availability of data for authorized
useAvailability models keep data and resources available for
authorized use during denial-of-service attacks, natural
disasters, and equipment failures
Principle 2: The Three Security Goals Are Confidentiality,
Integrity, and Availability (cont.)
© Pearson Education 2014, Information Security: Principles and
Practices, 2nd Edition
*
© Pearson Education 2014, Information Security: Principles and
Practices, 2nd Edition
*Defense in depthInvolves implemented security in overlapping
layers that provide the three elements needed to secure assets:
prevention, detection, and responseThe weaknesses of one
security layer are offset by the strengths of two or more layers
Principles 3: Defense in Depth as Strategy
© Pearson Education 2014, Information Security: Principles and
Practices, 2nd Edition
*
© Pearson Education 2014, Information Security: Principles and
Practices, 2nd Edition
*Takes little to convince someone to give up their credentials in
exchange for trivial or worthless goodsMany people are easily
convinced to double-click the attachment or links inside emails
Subject: Here you have, ;o)
Message body: Hi: Check This!
Attachment: AnnaKournikova.jpg.vbs
Principle 4: When Left on Their Own, People Tend to Make the
Worst Security Decisions
© Pearson Education 2014, Information Security: Principles and
Practices, 2nd Edition
*
© Pearson Education 2014, Information Security: Principles and
Practices, 2nd Edition
*Functional requirementsDescribe what a system should
doAssurance requirementsDescribe how functional requirements
should be implemented and tested
Does the system do the right things in the right
way?Verification: The process of confirming that one or more
predetermined requirements or specifications are metValidation:
A determination of the correctness or quality of the mechanisms
used in meeting the needs
Principle 5: Computer Security Depends on Two Types of
Requirements: Functional and Assurance
© Pearson Education 2014, Information Security: Principles and
Practices, 2nd Edition
*
© Pearson Education 2014, Information Security: Principles and
Practices, 2nd Edition
*Many people believe that if hackers don’t know how software
is secured, security is betterAlthough this seems logical, it’s
actually untrueObscuring security leads to a false sense of
security, which is often more dangerous than not addressing
security at all
Principle 6: Security Through Obscurity Is Not an Answer
© Pearson Education 2014, Information Security: Principles and
Practices, 2nd Edition
*
© Pearson Education 2014, Information Security: Principles and
Practices, 2nd Edition
*Security is not concerned with eliminating all threats within a
system or facility but with eliminating known threats and
minimizing losses if an attacker succeeds in exploiting a
vulnerabilitySpending more on security than the cost of an asset
is a waste of resourcesRisk assessment and risk analysis are
used to place an economic value on assets to best determine
appropriate countermeasures that protect them from losses
Principle 7: Security = Risk Management
© Pearson Education 2014, Information Security: Principles and
Practices, 2nd Edition
*
Principle 7: Security = Risk Management cont.
Two factors to determine riskWhat is the consequence of a
loss?What is the likelihood the loss will
occur?Consequences/likelihood matrix
© Pearson Education 2014, Information Security: Principles and
Practices, 2nd Edition
*LikelihoodConsequences1. Insignificant2. Minor3. Moderate4.
Major5. CatastrophicA (almost
certain)HighHighExtremeExtremeExtremeB
(likely)ModerateHighHighExtremeExtremeC
(moderate)LowModerateHighExtremeExtremeD
(unlikely)LowLowModerateHigh ExtremeE
(rare)LowLowModerateHighHigh
© Pearson Education 2014, Information Security: Principles and
Practices, 2nd Edition
© Pearson Education 2014, Information Security: Principles and
Practices, 2nd Edition
*VulnerabilityA known problem within a system or
programExploitA program or a “cookbook” on how to take
advantage of a specific vulnerabilityAttackerThe link between a
vulnerability and an exploit
Principle 7: Security = Risk Management
cont.
© Pearson Education 2014, Information Security: Principles and
Practices, 2nd Edition
*
© Pearson Education 2014, Information Security: Principles and
Practices, 2nd Edition
*A security mechanism serves a purpose by preventing a
compromise, detecting that a compromise or compromise
attempt is underway, or responding to a compromise while it is
happening or after it has been discovered
Principle 8: The Three Types of Security Controls Are
Preventative, Detective, and Responsive
© Pearson Education 2014, Information Security: Principles and
Practices, 2nd Edition
*
© Pearson Education 2014, Information Security: Principles and
Practices, 2nd Edition
*The more complex a system gets, the harder it is to secure
Principle 9: Complexity Is the Enemy of Security
© Pearson Education 2014, Information Security: Principles and
Practices, 2nd Edition
*
© Pearson Education 2014, Information Security: Principles and
Practices, 2nd Edition
*Information security managers must justify all investments in
security using techniques of the tradeWhen spending resources
can be justified with good, solid business rationale, security
requests are rarely denied
Principle 10: Fear, Uncertainty, and Doubt (FUD) Do Not Work
in Selling Security
© Pearson Education 2014, Information Security: Principles and
Practices, 2nd Edition
*
© Pearson Education 2014, Information Security: Principles and
Practices, 2nd Edition
*People controlsDual control and separation of dutiesProcess
controls Different people can perform the same operation the
same way every timeTechnology alone without people and
process controls can failPeople, process, and technology
controls are essential elements of security practices including
operations security, applications development security, physical
security, and cryptography
Principle 11: People, Process, and Technology Are All Needed
to Adequately Secure a System or Facility
© Pearson Education 2014, Information Security: Principles and
Practices, 2nd Edition
*
© Pearson Education 2014, Information Security: Principles and
Practices, 2nd Edition
*Keeping a given vulnerability secret from users and from the
software developer can only lead to a false sense of securityThe
need to know trumps the need to keep secrets to give users the
right to protect themselves
Principle 12: Open Disclosure of Vulnerabilities Is Good for
Security!
© Pearson Education 2014, Information Security: Principles and
Practices, 2nd Edition
*
Users have a right to know about defects in the products they
purchase, just as they have a right to know about automobile
recalls because of defects.
© Pearson Education 2014, Information Security: Principles and
Practices, 2nd Edition
*
SummaryComputer security specialists must not only know the
technical side of their jobs but also must understand the
principles behind information securityThese principles are
mixed and matched to describe why certain security functions
and operations exist in the real world of IT
© Pearson Education 2014, Information Security: Principles and
Practices, 2nd Edition
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
Users have a right to know about defects in the products they
purchase, just as they have a right to know about automobile
recalls because of defects.
*
Running head: ARTICLE REVIEW 1
ARTICLE REVIEW 4
Article Summary Assignment #1
Prepared by: Abhignya Kannaiahgari
Date: May 16th, 2019
ECS 6200 – Managing Information Security
Article Title: Why Reward for Loyal Spenders Are ‘a Honey Pot
for Hackers’
Reference
:https://www.nytimes.com/2019/05/11/business/rewards-loyalty-
program-fraud-
security.html?rref=collection%2Ftimestopic%2FComputer%20S
ecurity%20(Cybersecurity)&action=click&contentCollection=ti
mestopics&region=stream&module=stream_unit&version=latest
&contentPlacement=4&pgtype=collection
Loyalty programs are commonly known and utilized by the
people, but technology is modifying how it is utilized. Initially,
loyalty started with coupons, but with time and technological
integration, it has shifted to apps, and now websites (Hsu,
2019). But unlike many people realize, current loyalty programs
are after something more valuable today compared to currency,
and that is personal data. Personal data holds vital information
about the holder, and this makes them targets for hackers. This
data if stolen can be used to impersonate consumers breaching
the contracts of their loyalty programs (Hsu, 2019). Other
outcomes also include the depletion of accounts of their
financial resources into the black market. This raises the
question of whether loyalty programs are potential risks for
consumers.
An example is that of 2018 which is deemed as the largest
data breach in I.T. history when Marriot’ Starwood unit was a
victim to an attack whereby personal data was stolen. Mainly
passport numbers, they were stored in a DD (Dunkins’ Donuts’)
program that was not protected (Hsu, 2019). Hackers target
these loyalty programs as they offer a lot of data with the least
resistance; this is as per institutional experts. Users of these
programs easily sign up and use weak passwords and in most
cases neglect consumer data. Nonetheless, the overall reality of
the matter is that programs, hackers and technology, in general,
have grown at an almost exponential rate but cybersecurity is
lagging (Hsu, 2019).
The urgency of the matter is appreciated when people
understand that company loyalty programs are tailored to
faithful clients. With this in mind, they will willingly offer
personal information which will then be used to personalize
their experience. But with increasingly more information being
sent to the companies offering the loyalty programs less concern
is given on the data’s security (Hsu, 2019). But some companies
have learned from experience for example banks requiring
firmer authentications such as the two-factor authentication
system or various forms of biometric identification (Hsu, 2019).
The overall understanding that should be appreciated is that
loyalty programs are the new target for hackers.

More Related Content

Similar to Information SecurityPrinciples and Practices, 2nd Edit.docx

SIM - Mc leod ch09
SIM - Mc leod ch09SIM - Mc leod ch09
SIM - Mc leod ch09
Welly Tjoe
 
9213A Sampling of SettingsAfter reviewing the basi.docx
9213A Sampling of SettingsAfter reviewing the basi.docx9213A Sampling of SettingsAfter reviewing the basi.docx
9213A Sampling of SettingsAfter reviewing the basi.docx
evonnehoggarth79783
 
Information Security Management Systems(ISMS) By Dr Wafula
Information Security Management Systems(ISMS) By Dr  WafulaInformation Security Management Systems(ISMS) By Dr  Wafula
Information Security Management Systems(ISMS) By Dr Wafula
Discover JKUAT
 
RaoNayakShelve inNetworkingSecurityUser levelB.docx
RaoNayakShelve inNetworkingSecurityUser levelB.docxRaoNayakShelve inNetworkingSecurityUser levelB.docx
RaoNayakShelve inNetworkingSecurityUser levelB.docx
audeleypearl
 
Security Program and PoliciesPrinciples and Practicesby Sari.docx
Security Program and PoliciesPrinciples and Practicesby Sari.docxSecurity Program and PoliciesPrinciples and Practicesby Sari.docx
Security Program and PoliciesPrinciples and Practicesby Sari.docx
bagotjesusa
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
madunix
 

Similar to Information SecurityPrinciples and Practices, 2nd Edit.docx (20)

SIM - Mc leod ch09
SIM - Mc leod ch09SIM - Mc leod ch09
SIM - Mc leod ch09
 
1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf
 
9213A Sampling of SettingsAfter reviewing the basi.docx
9213A Sampling of SettingsAfter reviewing the basi.docx9213A Sampling of SettingsAfter reviewing the basi.docx
9213A Sampling of SettingsAfter reviewing the basi.docx
 
Security and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptxSecurity and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptx
 
Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)
 
Is ch1 (2)
Is ch1 (2)Is ch1 (2)
Is ch1 (2)
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
 
Information Security Management Systems(ISMS) By Dr Wafula
Information Security Management Systems(ISMS) By Dr  WafulaInformation Security Management Systems(ISMS) By Dr  Wafula
Information Security Management Systems(ISMS) By Dr Wafula
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdf
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptx
 
What is Information Assurance Model in Cyber Security.pptx
What is Information Assurance Model in Cyber Security.pptxWhat is Information Assurance Model in Cyber Security.pptx
What is Information Assurance Model in Cyber Security.pptx
 
Security in it
Security in it Security in it
Security in it
 
RaoNayakShelve inNetworkingSecurityUser levelB.docx
RaoNayakShelve inNetworkingSecurityUser levelB.docxRaoNayakShelve inNetworkingSecurityUser levelB.docx
RaoNayakShelve inNetworkingSecurityUser levelB.docx
 
Information Assurance And Security - Chapter 1 - Lesson 4
Information Assurance And Security - Chapter 1 - Lesson 4Information Assurance And Security - Chapter 1 - Lesson 4
Information Assurance And Security - Chapter 1 - Lesson 4
 
CS Sakerhetsdagen 2015 IBM Feb 19
CS Sakerhetsdagen 2015 IBM Feb 19CS Sakerhetsdagen 2015 IBM Feb 19
CS Sakerhetsdagen 2015 IBM Feb 19
 
Effective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern ChallengesEffective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern Challenges
 
Ch01_Introduction_to_Information_Securit.ppt
Ch01_Introduction_to_Information_Securit.pptCh01_Introduction_to_Information_Securit.ppt
Ch01_Introduction_to_Information_Securit.ppt
 
Ch01_Introduction_to_Information_Securit.ppt
Ch01_Introduction_to_Information_Securit.pptCh01_Introduction_to_Information_Securit.ppt
Ch01_Introduction_to_Information_Securit.ppt
 
Security Program and PoliciesPrinciples and Practicesby Sari.docx
Security Program and PoliciesPrinciples and Practicesby Sari.docxSecurity Program and PoliciesPrinciples and Practicesby Sari.docx
Security Program and PoliciesPrinciples and Practicesby Sari.docx
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
 

More from annettsparrow

Initial Post  (250 words)Read and interpret the short story .docx
Initial Post  (250 words)Read and interpret the short story .docxInitial Post  (250 words)Read and interpret the short story .docx
Initial Post  (250 words)Read and interpret the short story .docx
annettsparrow
 
initial post one paragraph intext citation and reference Require.docx
initial post one paragraph intext citation and reference Require.docxinitial post one paragraph intext citation and reference Require.docx
initial post one paragraph intext citation and reference Require.docx
annettsparrow
 
Infrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docxInfrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docx
annettsparrow
 
Inital post please respond for the above post question one page with.docx
Inital post please respond for the above post question one page with.docxInital post please respond for the above post question one page with.docx
Inital post please respond for the above post question one page with.docx
annettsparrow
 
Infornnation Technologyin Hunnan ResourceAnEmpirical .docx
Infornnation Technologyin Hunnan ResourceAnEmpirical .docxInfornnation Technologyin Hunnan ResourceAnEmpirical .docx
Infornnation Technologyin Hunnan ResourceAnEmpirical .docx
annettsparrow
 
INFORMED CONSENT LETTER Page 1 of 2 SELF CONSENT .docx
INFORMED CONSENT LETTER  Page 1 of 2 SELF CONSENT .docxINFORMED CONSENT LETTER  Page 1 of 2 SELF CONSENT .docx
INFORMED CONSENT LETTER Page 1 of 2 SELF CONSENT .docx
annettsparrow
 
INFORMATIONGOVERNANCEFounded in 1807, John W.docx
INFORMATIONGOVERNANCEFounded in 1807, John W.docxINFORMATIONGOVERNANCEFounded in 1807, John W.docx
INFORMATIONGOVERNANCEFounded in 1807, John W.docx
annettsparrow
 
Informative Presentation Delivery OutlineI. HeaderSpeec.docx
Informative Presentation Delivery OutlineI.  HeaderSpeec.docxInformative Presentation Delivery OutlineI.  HeaderSpeec.docx
Informative Presentation Delivery OutlineI. HeaderSpeec.docx
annettsparrow
 
INFORMATION THAT SHOULD GO INTO PROCESS RECORDING FOR MICRO WORK.docx
INFORMATION THAT SHOULD GO INTO PROCESS RECORDING FOR MICRO WORK.docxINFORMATION THAT SHOULD GO INTO PROCESS RECORDING FOR MICRO WORK.docx
INFORMATION THAT SHOULD GO INTO PROCESS RECORDING FOR MICRO WORK.docx
annettsparrow
 

More from annettsparrow (20)

Initial Post  (250 words)Read and interpret the short story .docx
Initial Post  (250 words)Read and interpret the short story .docxInitial Post  (250 words)Read and interpret the short story .docx
Initial Post  (250 words)Read and interpret the short story .docx
 
initial post one paragraph intext citation and reference Require.docx
initial post one paragraph intext citation and reference Require.docxinitial post one paragraph intext citation and reference Require.docx
initial post one paragraph intext citation and reference Require.docx
 
Initial Post InstructionsTriggers are ethnocentric responses to .docx
Initial Post InstructionsTriggers are ethnocentric responses to .docxInitial Post InstructionsTriggers are ethnocentric responses to .docx
Initial Post InstructionsTriggers are ethnocentric responses to .docx
 
Initial Post InstructionsFor the initial post,consider thr.docx
Initial Post InstructionsFor the initial post,consider thr.docxInitial Post InstructionsFor the initial post,consider thr.docx
Initial Post InstructionsFor the initial post,consider thr.docx
 
Initial Post InstructionsFor the initial post, choose and ad.docx
Initial Post InstructionsFor the initial post, choose and ad.docxInitial Post InstructionsFor the initial post, choose and ad.docx
Initial Post InstructionsFor the initial post, choose and ad.docx
 
Initial Post InstructionsDiscuss the differences and similaritie.docx
Initial Post InstructionsDiscuss the differences and similaritie.docxInitial Post InstructionsDiscuss the differences and similaritie.docx
Initial Post InstructionsDiscuss the differences and similaritie.docx
 
Initial Post InstructionsAs we jump into the world of Alge.docx
Initial Post InstructionsAs we jump into the world of Alge.docxInitial Post InstructionsAs we jump into the world of Alge.docx
Initial Post InstructionsAs we jump into the world of Alge.docx
 
Initial Post InstructionsFor the initial post, respond to one .docx
Initial Post InstructionsFor the initial post, respond to one .docxInitial Post InstructionsFor the initial post, respond to one .docx
Initial Post InstructionsFor the initial post, respond to one .docx
 
Initial Post InstructionsAgenda setting can be a difficult t.docx
Initial Post InstructionsAgenda setting can be a difficult t.docxInitial Post InstructionsAgenda setting can be a difficult t.docx
Initial Post InstructionsAgenda setting can be a difficult t.docx
 
Initial Post Identify all the components of a cell. Describe the fu.docx
Initial Post Identify all the components of a cell. Describe the fu.docxInitial Post Identify all the components of a cell. Describe the fu.docx
Initial Post Identify all the components of a cell. Describe the fu.docx
 
Initial Discussion Board Post Compare and contrast life for col.docx
Initial Discussion Board Post Compare and contrast life for col.docxInitial Discussion Board Post Compare and contrast life for col.docx
Initial Discussion Board Post Compare and contrast life for col.docx
 
Infrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docxInfrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docx
 
Inital post please respond for the above post question one page with.docx
Inital post please respond for the above post question one page with.docxInital post please respond for the above post question one page with.docx
Inital post please respond for the above post question one page with.docx
 
Infornnation Technologyin Hunnan ResourceAnEmpirical .docx
Infornnation Technologyin Hunnan ResourceAnEmpirical .docxInfornnation Technologyin Hunnan ResourceAnEmpirical .docx
Infornnation Technologyin Hunnan ResourceAnEmpirical .docx
 
INFORMED CONSENT LETTER Page 1 of 2 SELF CONSENT .docx
INFORMED CONSENT LETTER  Page 1 of 2 SELF CONSENT .docxINFORMED CONSENT LETTER  Page 1 of 2 SELF CONSENT .docx
INFORMED CONSENT LETTER Page 1 of 2 SELF CONSENT .docx
 
INFORMATIONGOVERNANCEFounded in 1807, John W.docx
INFORMATIONGOVERNANCEFounded in 1807, John W.docxINFORMATIONGOVERNANCEFounded in 1807, John W.docx
INFORMATIONGOVERNANCEFounded in 1807, John W.docx
 
Informative Presentation Delivery OutlineI. HeaderSpeec.docx
Informative Presentation Delivery OutlineI.  HeaderSpeec.docxInformative Presentation Delivery OutlineI.  HeaderSpeec.docx
Informative Presentation Delivery OutlineI. HeaderSpeec.docx
 
Informed Consent FormBy the due date assigned, submit the Inform.docx
Informed Consent FormBy the due date assigned, submit the Inform.docxInformed Consent FormBy the due date assigned, submit the Inform.docx
Informed Consent FormBy the due date assigned, submit the Inform.docx
 
INFORMATION THAT SHOULD GO INTO PROCESS RECORDING FOR MICRO WORK.docx
INFORMATION THAT SHOULD GO INTO PROCESS RECORDING FOR MICRO WORK.docxINFORMATION THAT SHOULD GO INTO PROCESS RECORDING FOR MICRO WORK.docx
INFORMATION THAT SHOULD GO INTO PROCESS RECORDING FOR MICRO WORK.docx
 
Information Technology Capstone ProjectIn this course, learners .docx
Information Technology Capstone ProjectIn this course, learners .docxInformation Technology Capstone ProjectIn this course, learners .docx
Information Technology Capstone ProjectIn this course, learners .docx
 

Recently uploaded

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 

Recently uploaded (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 

Information SecurityPrinciples and Practices, 2nd Edit.docx

  • 1. Information Security Principles and Practices, 2nd Edition Dr. Cindi Nadelman New England College Chapter 2: Information Security Principles of Success * © Pearson Education 2014, Information Security: Principles and Practices, 2nd Edition * ObjectivesBuild an awareness of 12 basic principles of information securityDistinguish among the three main security goalsLearn how to design and apply the principle of “Defense in Depth”Comprehend human vulnerabilities are security systems © Pearson Education 2014, Information Security: Principles and Practices, 2nd Edition *
  • 2. © Pearson Education 2014, Information Security: Principles and Practices, 2nd Edition * Objectives (cont.)Explain the difference between functional and assurance requirementsComprehend the fallacy of security through obscurityComprehend the importance of risk analysis and risk management tools and techniquesDetermine which side of open disclosure debate you would take © Pearson Education 2014, Information Security: Principles and Practices, 2nd Edition * © Pearson Education 2014, Information Security: Principles and Practices, 2nd Edition * IntroductionBest security specialists combine practical knowledge and technical skills with understanding of human natureNo two systems or situations are identical, and there are no cookbooks to consult on how to solve security problems © Pearson Education 2014, Information Security: Principles and Practices, 2nd Edition * © Pearson Education 2014, Information Security: Principles and Practices, 2nd Edition *Given enough time, tools, skills, and inclination, a hacker can break through any security measureSecurity testing can buy
  • 3. additional time so the attackers are caught in the act Principle 1:There Is No Such Thing as Absolute Security © Pearson Education 2014, Information Security: Principles and Practices, 2nd Edition * © Pearson Education 2014, Information Security: Principles and Practices, 2nd Edition *All information security measures try to address at least one of the three goals:ConfidentialityIntegrityAvailability The three security goals form the CIA triad Principle 2: The Three Security Goals Are Confidentiality, Integrity, and Availability © Pearson Education 2014, Information Security: Principles and Practices, 2nd Edition * © Pearson Education 2014, Information Security: Principles and Practices, 2nd Edition *Protect the confidentiality of dataConfidentiality models are primarily intended to ensure that no unauthorized access to information is permitted and that accidental disclosure of sensitive information is not possible Preserve the integrity of dataIntegrity models keep data pure and trustworthy by protecting system data from intentional and accidental changesPromote the availability of data for authorized useAvailability models keep data and resources available for authorized use during denial-of-service attacks, natural
  • 4. disasters, and equipment failures Principle 2: The Three Security Goals Are Confidentiality, Integrity, and Availability (cont.) © Pearson Education 2014, Information Security: Principles and Practices, 2nd Edition * © Pearson Education 2014, Information Security: Principles and Practices, 2nd Edition *Defense in depthInvolves implemented security in overlapping layers that provide the three elements needed to secure assets: prevention, detection, and responseThe weaknesses of one security layer are offset by the strengths of two or more layers Principles 3: Defense in Depth as Strategy © Pearson Education 2014, Information Security: Principles and Practices, 2nd Edition * © Pearson Education 2014, Information Security: Principles and Practices, 2nd Edition *Takes little to convince someone to give up their credentials in exchange for trivial or worthless goodsMany people are easily convinced to double-click the attachment or links inside emails Subject: Here you have, ;o) Message body: Hi: Check This! Attachment: AnnaKournikova.jpg.vbs Principle 4: When Left on Their Own, People Tend to Make the
  • 5. Worst Security Decisions © Pearson Education 2014, Information Security: Principles and Practices, 2nd Edition * © Pearson Education 2014, Information Security: Principles and Practices, 2nd Edition *Functional requirementsDescribe what a system should doAssurance requirementsDescribe how functional requirements should be implemented and tested Does the system do the right things in the right way?Verification: The process of confirming that one or more predetermined requirements or specifications are metValidation: A determination of the correctness or quality of the mechanisms used in meeting the needs Principle 5: Computer Security Depends on Two Types of Requirements: Functional and Assurance © Pearson Education 2014, Information Security: Principles and Practices, 2nd Edition * © Pearson Education 2014, Information Security: Principles and Practices, 2nd Edition *Many people believe that if hackers don’t know how software is secured, security is betterAlthough this seems logical, it’s actually untrueObscuring security leads to a false sense of security, which is often more dangerous than not addressing
  • 6. security at all Principle 6: Security Through Obscurity Is Not an Answer © Pearson Education 2014, Information Security: Principles and Practices, 2nd Edition * © Pearson Education 2014, Information Security: Principles and Practices, 2nd Edition *Security is not concerned with eliminating all threats within a system or facility but with eliminating known threats and minimizing losses if an attacker succeeds in exploiting a vulnerabilitySpending more on security than the cost of an asset is a waste of resourcesRisk assessment and risk analysis are used to place an economic value on assets to best determine appropriate countermeasures that protect them from losses Principle 7: Security = Risk Management © Pearson Education 2014, Information Security: Principles and Practices, 2nd Edition * Principle 7: Security = Risk Management cont. Two factors to determine riskWhat is the consequence of a loss?What is the likelihood the loss will occur?Consequences/likelihood matrix © Pearson Education 2014, Information Security: Principles and Practices, 2nd Edition *LikelihoodConsequences1. Insignificant2. Minor3. Moderate4. Major5. CatastrophicA (almost
  • 7. certain)HighHighExtremeExtremeExtremeB (likely)ModerateHighHighExtremeExtremeC (moderate)LowModerateHighExtremeExtremeD (unlikely)LowLowModerateHigh ExtremeE (rare)LowLowModerateHighHigh © Pearson Education 2014, Information Security: Principles and Practices, 2nd Edition © Pearson Education 2014, Information Security: Principles and Practices, 2nd Edition *VulnerabilityA known problem within a system or programExploitA program or a “cookbook” on how to take advantage of a specific vulnerabilityAttackerThe link between a vulnerability and an exploit Principle 7: Security = Risk Management cont. © Pearson Education 2014, Information Security: Principles and Practices, 2nd Edition * © Pearson Education 2014, Information Security: Principles and Practices, 2nd Edition *A security mechanism serves a purpose by preventing a compromise, detecting that a compromise or compromise attempt is underway, or responding to a compromise while it is happening or after it has been discovered Principle 8: The Three Types of Security Controls Are Preventative, Detective, and Responsive © Pearson Education 2014, Information Security: Principles and Practices, 2nd Edition
  • 8. * © Pearson Education 2014, Information Security: Principles and Practices, 2nd Edition *The more complex a system gets, the harder it is to secure Principle 9: Complexity Is the Enemy of Security © Pearson Education 2014, Information Security: Principles and Practices, 2nd Edition * © Pearson Education 2014, Information Security: Principles and Practices, 2nd Edition *Information security managers must justify all investments in security using techniques of the tradeWhen spending resources can be justified with good, solid business rationale, security requests are rarely denied Principle 10: Fear, Uncertainty, and Doubt (FUD) Do Not Work in Selling Security © Pearson Education 2014, Information Security: Principles and Practices, 2nd Edition * © Pearson Education 2014, Information Security: Principles and
  • 9. Practices, 2nd Edition *People controlsDual control and separation of dutiesProcess controls Different people can perform the same operation the same way every timeTechnology alone without people and process controls can failPeople, process, and technology controls are essential elements of security practices including operations security, applications development security, physical security, and cryptography Principle 11: People, Process, and Technology Are All Needed to Adequately Secure a System or Facility © Pearson Education 2014, Information Security: Principles and Practices, 2nd Edition * © Pearson Education 2014, Information Security: Principles and Practices, 2nd Edition *Keeping a given vulnerability secret from users and from the software developer can only lead to a false sense of securityThe need to know trumps the need to keep secrets to give users the right to protect themselves Principle 12: Open Disclosure of Vulnerabilities Is Good for Security! © Pearson Education 2014, Information Security: Principles and Practices, 2nd Edition * Users have a right to know about defects in the products they purchase, just as they have a right to know about automobile recalls because of defects.
  • 10. © Pearson Education 2014, Information Security: Principles and Practices, 2nd Edition * SummaryComputer security specialists must not only know the technical side of their jobs but also must understand the principles behind information securityThese principles are mixed and matched to describe why certain security functions and operations exist in the real world of IT © Pearson Education 2014, Information Security: Principles and Practices, 2nd Edition * * * * * * * * * * * *
  • 11. * * * * * * * Users have a right to know about defects in the products they purchase, just as they have a right to know about automobile recalls because of defects. * Running head: ARTICLE REVIEW 1 ARTICLE REVIEW 4 Article Summary Assignment #1 Prepared by: Abhignya Kannaiahgari Date: May 16th, 2019 ECS 6200 – Managing Information Security Article Title: Why Reward for Loyal Spenders Are ‘a Honey Pot for Hackers’ Reference :https://www.nytimes.com/2019/05/11/business/rewards-loyalty- program-fraud- security.html?rref=collection%2Ftimestopic%2FComputer%20S ecurity%20(Cybersecurity)&action=click&contentCollection=ti mestopics&region=stream&module=stream_unit&version=latest &contentPlacement=4&pgtype=collection Loyalty programs are commonly known and utilized by the
  • 12. people, but technology is modifying how it is utilized. Initially, loyalty started with coupons, but with time and technological integration, it has shifted to apps, and now websites (Hsu, 2019). But unlike many people realize, current loyalty programs are after something more valuable today compared to currency, and that is personal data. Personal data holds vital information about the holder, and this makes them targets for hackers. This data if stolen can be used to impersonate consumers breaching the contracts of their loyalty programs (Hsu, 2019). Other outcomes also include the depletion of accounts of their financial resources into the black market. This raises the question of whether loyalty programs are potential risks for consumers. An example is that of 2018 which is deemed as the largest data breach in I.T. history when Marriot’ Starwood unit was a victim to an attack whereby personal data was stolen. Mainly passport numbers, they were stored in a DD (Dunkins’ Donuts’) program that was not protected (Hsu, 2019). Hackers target these loyalty programs as they offer a lot of data with the least resistance; this is as per institutional experts. Users of these programs easily sign up and use weak passwords and in most cases neglect consumer data. Nonetheless, the overall reality of the matter is that programs, hackers and technology, in general, have grown at an almost exponential rate but cybersecurity is lagging (Hsu, 2019). The urgency of the matter is appreciated when people understand that company loyalty programs are tailored to faithful clients. With this in mind, they will willingly offer personal information which will then be used to personalize their experience. But with increasingly more information being sent to the companies offering the loyalty programs less concern is given on the data’s security (Hsu, 2019). But some companies have learned from experience for example banks requiring firmer authentications such as the two-factor authentication system or various forms of biometric identification (Hsu, 2019).
  • 13. The overall understanding that should be appreciated is that loyalty programs are the new target for hackers.