SlideShare a Scribd company logo
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information
Systems Security
Lesson 1
Information Systems Security
Learning Objective(s)
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 2
 Explain information systems security and
its effect on people and businesses.
Key Concepts
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 3
 Information systems security concepts
 Confidentiality, integrity, and availability (CIA)
 The seven domains of an IT infrastructure
 The weakest link in the security of an IT
infrastructure
 IT security policy framework and data
classification standard
Information Systems Security
Internet
• Is a worldwide network with more than 2 billion users
• Includes governments, businesses, and
organizations
• Links communication networks to one another
World Wide Web
• A system that defines how documents and
resources are related across network machines
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 4
Recent Data Breaches: Examples
Adobe Systems Incorporated, 2013
• Hackers published data for 150 million accounts
• Stole encrypted customer credit card data
• Compromised login credentials
U.S. Office of Personnel Management, 2015
• Data breach impacted 22 million people
• Stole SSNs, names, places of birth, addresses
• Millions must be monitored for identity theft for years
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 5
Cyberspace: The New Frontier
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 6
Internet of Things (IoT)
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 7
Risks, Threats, and Vulnerabilities
Likelihood that something bad will
happen to an asset
Risk
Any action that could damage an asset
Threat
A weakness that allows a threat to be
realized or to have an effect on an asset
Vulnerability
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 8
What Is Information Systems
Security?
Hardware, operating system, and
application software that work together
to collect, process, and store data for
individuals and organizations
Information
system
The collection of activities that protect
the information system and the data
stored in it.
Information
system
security
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 9
U.S. Compliance Laws Drive Need
for Information Systems Security
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 10
Tenets of Information Systems
Security
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 11
Tenets of Information Systems
Security
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 12
Confidentiality: Only authorized
users can view information.
Integrity: Only authorized users can
change information.
Availability: Information is
accessible by authorized users
whenever they request the
information.
Confidentiality
Private data
of
individuals
Intellectual
property of
businesses
National
security for
countries
and
government
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 13
Confidentiality (cont.)
Practice of hiding data and keeping
it away from unauthorized users
Cryptography
The process of transforming data
from cleartext into ciphertext
Encryption
The scrambled data that are the
result of encrypting cleartext
Ciphertext
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 14
Encryption of Cleartext into
Ciphertext
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 15
Integrity
Maintain valid, uncorrupted, and accurate
information
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 16
Availability
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 17
In the context of information security
• The amount of time users can use a system,
application, and data
Availability Time Measurements
Uptime
Downtime
Availability [A = (Total Uptime)/(Total Uptime + Total Downtime)]
Mean time to failure (MTTF)
Mean time to repair (MTTR)
Mean time between failures (MTBF)
Recovery time objective (RTO)
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 18
Seven Domains of a Typical IT
Infrastructure
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 19
Seven Domains of a Typical IT
Infrastructure
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 20
1. User Domain: Defines the people who access an organization’s
information systems
2. Workstation Domain: Includes desktop computers, laptop computers,
special-purpose terminals, or any other device that connects to the
network
3. LAN Domain: A collection of computers connected to one another or to a
common connection medium
4. LAN-to-WAN Domain: Where the IT infrastructure links to a wide area
network and the Internet
5. WAN Domain: Connects remote locations
6. Remote Access Domain: Connects remote users to an organization’s IT
infrastructure
7. System/Application Domain: Holds all mission-critical systems,
applications, and data
User Domain
Roles and tasks
• Users can access systems, applications, and data
depending upon their defined access rights.
Responsibilities
• Employees are responsible for their use of IT assets.
Accountability
• HR department is accountable for implementing proper
employee background checks.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 21
Common Threats in the User Domain
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 22
 Lack of user awareness
 User apathy toward policies
 User violating security policy
 User inserting CD/USB with personal files
 User downloading photos, music, or videos
 User destructing systems, applications, and data
 Disgruntled employee attacking organization or
committing sabotage
 Employee blackmail or extortion
Workstation Domain
Roles and tasks
• Configure hardware, harden systems, and verify
antivirus files.
Responsibilities
• Ensure the integrity of user workstations and data.
Accountability
• Director of IT security is generally in charge of ensuring
that the Workstation Domain conforms to policy.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 23
Common Threats in the Workstation
Domain
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 24
 Unauthorized workstation access
 Unauthorized access to systems, applications,
and data
 Desktop or laptop operating system vulnerabilities
 Desktop or laptop application software
vulnerabilities or patches
 Viruses, malicious code, and other malware
 User inserting CD/DVD/USB with personal files
 User downloading photos, music, or videos
LAN Domain
Roles and tasks
• Includes both physical network components and logical
configuration of services for users.
Responsibilities
• LAN support group is in charge of physical components
and logical elements.
Accountability
• LAN manager’s duty is to maximize use and integrity of
data within the LAN Domain.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 25
Common Threats in the LAN Domain
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 26
 Unauthorized physical access to LAN
 Unauthorized access to systems, applications,
and data
 LAN server operating system vulnerabilities
 LAN server application software vulnerabilities
and software patch updates
 Rogue users on WLANs
 Confidentiality of data on WLANs
 LAN server configuration guidelines and
standards
Weakest Link in the Security of an IT
Infrastructure
User is weakest link in security
Strategies for reducing risk
• Check background of job candidates carefully.
• Evaluate staff regularly.
• Rotate access to sensitive systems, applications, and
data among staff positions.
• Test applications and software and review for quality
• Regularly review security plans.
• Perform annual security control audits.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 27
Ethics and the Internet
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 28
 Human behavior online is often less mature
than in normal social settings
 Demand for systems security professionals is
growing so rapidly
 U.S. government and Internet Architecture
Board (IAB) defined a policy regarding
acceptable use of Internet geared toward U.S.
citizens
• Policy is not a law or mandated
IT Security Policy Framework
Policy
• A short written statement that defines a course of
action that applies to entire organization
Standard
• A detailed written definition of how software and
hardware are to be used
Procedures
• Written instructions for how to use policies and
standards
Guidelines
• Suggested course of action for using policy,
standard, or procedure
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 29
Hierarchical IT Security Policy
Framework
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 30
Foundational IT Security Policies
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 31
Acceptable use policy (AUP)
 Security awareness policy
 Asset classification policy
 Asset protection policy
 Asset management policy
 Vulnerability assessment/management
 Threat assessment and monitoring
Data about people that must be kept
private
Private data
Information or data owned by the
organization
Confidential
Information or data shared internally
by an organization
Information or data shared with the
public
Internal use
only
Public domain
data
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 32
Data Classification Standards
Summary
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Page 2Fundamentals of Information Systems Security www.jblearning.com
All rights reserved.
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Fundamentals of Information Systems Security Page 33
 Information systems security concepts
 Confidentiality, integrity, and availability (CIA)
 The seven domains of an IT infrastructure
 The weakest link in the security of an IT
infrastructure
 IT security policy framework and data
classification standard

More Related Content

Similar to Dr_Kamal_ch01.pptx

Fundamentals of Information Systems Security Lesson 3Malic.docx
Fundamentals of Information Systems Security Lesson 3Malic.docxFundamentals of Information Systems Security Lesson 3Malic.docx
Fundamentals of Information Systems Security Lesson 3Malic.docx
shericehewat
 
Fundamentals of Information Systems Security Lesson 2The I.docx
Fundamentals of Information Systems Security Lesson 2The I.docxFundamentals of Information Systems Security Lesson 2The I.docx
Fundamentals of Information Systems Security Lesson 2The I.docx
shericehewat
 

Similar to Dr_Kamal_ch01.pptx (20)

Fundamentals of Information Systems Security Chapter 7
Fundamentals of Information Systems Security Chapter 7Fundamentals of Information Systems Security Chapter 7
Fundamentals of Information Systems Security Chapter 7
 
Fundamentals of Information Systems Security Chapter 15
Fundamentals of Information Systems Security Chapter 15Fundamentals of Information Systems Security Chapter 15
Fundamentals of Information Systems Security Chapter 15
 
Fundamentals of Information Systems Security Chapter 4
Fundamentals of Information Systems Security Chapter 4Fundamentals of Information Systems Security Chapter 4
Fundamentals of Information Systems Security Chapter 4
 
Funsec3e ppt ch11
Funsec3e ppt ch11Funsec3e ppt ch11
Funsec3e ppt ch11
 
info-sys-security3.pptx
info-sys-security3.pptxinfo-sys-security3.pptx
info-sys-security3.pptx
 
Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2 Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2
 
Fundamentals of Information Systems Security Chapter 5
Fundamentals of Information Systems Security Chapter 5Fundamentals of Information Systems Security Chapter 5
Fundamentals of Information Systems Security Chapter 5
 
info-sys-security.pptx
info-sys-security.pptxinfo-sys-security.pptx
info-sys-security.pptx
 
Fundamentals of Information Systems Security Chapter 9
Fundamentals of Information Systems Security Chapter 9Fundamentals of Information Systems Security Chapter 9
Fundamentals of Information Systems Security Chapter 9
 
Funsec3e ppt ch05
Funsec3e ppt ch05Funsec3e ppt ch05
Funsec3e ppt ch05
 
Fundamentals of Information Systems Security Lesson 3Malic.docx
Fundamentals of Information Systems Security Lesson 3Malic.docxFundamentals of Information Systems Security Lesson 3Malic.docx
Fundamentals of Information Systems Security Lesson 3Malic.docx
 
Fundamentals of Information Systems Security Chapter 8
Fundamentals of Information Systems Security Chapter 8Fundamentals of Information Systems Security Chapter 8
Fundamentals of Information Systems Security Chapter 8
 
Fundamentals of Information Systems Security Chapter 13
Fundamentals of Information Systems Security Chapter 13Fundamentals of Information Systems Security Chapter 13
Fundamentals of Information Systems Security Chapter 13
 
Funsec3e ppt ch14
Funsec3e ppt ch14Funsec3e ppt ch14
Funsec3e ppt ch14
 
Fundamentals of Information Systems Security Chapter 14
Fundamentals of Information Systems Security Chapter 14Fundamentals of Information Systems Security Chapter 14
Fundamentals of Information Systems Security Chapter 14
 
Fundamentals of Information Systems Security Chapter 12
Fundamentals of Information Systems Security Chapter 12Fundamentals of Information Systems Security Chapter 12
Fundamentals of Information Systems Security Chapter 12
 
Funsec3e ppt ch13
Funsec3e ppt ch13Funsec3e ppt ch13
Funsec3e ppt ch13
 
Fundamentals of Information Systems Security Lesson 2The I.docx
Fundamentals of Information Systems Security Lesson 2The I.docxFundamentals of Information Systems Security Lesson 2The I.docx
Fundamentals of Information Systems Security Lesson 2The I.docx
 
Understanding Federal IT Compliance in Three Steps - SharePoint Fest DC
Understanding Federal IT Compliance in Three Steps  - SharePoint Fest DCUnderstanding Federal IT Compliance in Three Steps  - SharePoint Fest DC
Understanding Federal IT Compliance in Three Steps - SharePoint Fest DC
 
Proactive Risk Management and Compliance in a World of Digital Disruption
Proactive Risk Management and Compliance in a World of Digital DisruptionProactive Risk Management and Compliance in a World of Digital Disruption
Proactive Risk Management and Compliance in a World of Digital Disruption
 

Recently uploaded

Recently uploaded (20)

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 

Dr_Kamal_ch01.pptx

  • 1. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Lesson 1 Information Systems Security
  • 2. Learning Objective(s) © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 2  Explain information systems security and its effect on people and businesses.
  • 3. Key Concepts © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 3  Information systems security concepts  Confidentiality, integrity, and availability (CIA)  The seven domains of an IT infrastructure  The weakest link in the security of an IT infrastructure  IT security policy framework and data classification standard
  • 4. Information Systems Security Internet • Is a worldwide network with more than 2 billion users • Includes governments, businesses, and organizations • Links communication networks to one another World Wide Web • A system that defines how documents and resources are related across network machines © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 4
  • 5. Recent Data Breaches: Examples Adobe Systems Incorporated, 2013 • Hackers published data for 150 million accounts • Stole encrypted customer credit card data • Compromised login credentials U.S. Office of Personnel Management, 2015 • Data breach impacted 22 million people • Stole SSNs, names, places of birth, addresses • Millions must be monitored for identity theft for years © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 5
  • 6. Cyberspace: The New Frontier © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 6
  • 7. Internet of Things (IoT) © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 7
  • 8. Risks, Threats, and Vulnerabilities Likelihood that something bad will happen to an asset Risk Any action that could damage an asset Threat A weakness that allows a threat to be realized or to have an effect on an asset Vulnerability © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 8
  • 9. What Is Information Systems Security? Hardware, operating system, and application software that work together to collect, process, and store data for individuals and organizations Information system The collection of activities that protect the information system and the data stored in it. Information system security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 9
  • 10. U.S. Compliance Laws Drive Need for Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 10
  • 11. Tenets of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 11
  • 12. Tenets of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 12 Confidentiality: Only authorized users can view information. Integrity: Only authorized users can change information. Availability: Information is accessible by authorized users whenever they request the information.
  • 13. Confidentiality Private data of individuals Intellectual property of businesses National security for countries and government © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 13
  • 14. Confidentiality (cont.) Practice of hiding data and keeping it away from unauthorized users Cryptography The process of transforming data from cleartext into ciphertext Encryption The scrambled data that are the result of encrypting cleartext Ciphertext © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 14
  • 15. Encryption of Cleartext into Ciphertext © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 15
  • 16. Integrity Maintain valid, uncorrupted, and accurate information © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 16
  • 17. Availability © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 17 In the context of information security • The amount of time users can use a system, application, and data
  • 18. Availability Time Measurements Uptime Downtime Availability [A = (Total Uptime)/(Total Uptime + Total Downtime)] Mean time to failure (MTTF) Mean time to repair (MTTR) Mean time between failures (MTBF) Recovery time objective (RTO) © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 18
  • 19. Seven Domains of a Typical IT Infrastructure © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 19
  • 20. Seven Domains of a Typical IT Infrastructure © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 20 1. User Domain: Defines the people who access an organization’s information systems 2. Workstation Domain: Includes desktop computers, laptop computers, special-purpose terminals, or any other device that connects to the network 3. LAN Domain: A collection of computers connected to one another or to a common connection medium 4. LAN-to-WAN Domain: Where the IT infrastructure links to a wide area network and the Internet 5. WAN Domain: Connects remote locations 6. Remote Access Domain: Connects remote users to an organization’s IT infrastructure 7. System/Application Domain: Holds all mission-critical systems, applications, and data
  • 21. User Domain Roles and tasks • Users can access systems, applications, and data depending upon their defined access rights. Responsibilities • Employees are responsible for their use of IT assets. Accountability • HR department is accountable for implementing proper employee background checks. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 21
  • 22. Common Threats in the User Domain © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 22  Lack of user awareness  User apathy toward policies  User violating security policy  User inserting CD/USB with personal files  User downloading photos, music, or videos  User destructing systems, applications, and data  Disgruntled employee attacking organization or committing sabotage  Employee blackmail or extortion
  • 23. Workstation Domain Roles and tasks • Configure hardware, harden systems, and verify antivirus files. Responsibilities • Ensure the integrity of user workstations and data. Accountability • Director of IT security is generally in charge of ensuring that the Workstation Domain conforms to policy. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 23
  • 24. Common Threats in the Workstation Domain © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 24  Unauthorized workstation access  Unauthorized access to systems, applications, and data  Desktop or laptop operating system vulnerabilities  Desktop or laptop application software vulnerabilities or patches  Viruses, malicious code, and other malware  User inserting CD/DVD/USB with personal files  User downloading photos, music, or videos
  • 25. LAN Domain Roles and tasks • Includes both physical network components and logical configuration of services for users. Responsibilities • LAN support group is in charge of physical components and logical elements. Accountability • LAN manager’s duty is to maximize use and integrity of data within the LAN Domain. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 25
  • 26. Common Threats in the LAN Domain © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 26  Unauthorized physical access to LAN  Unauthorized access to systems, applications, and data  LAN server operating system vulnerabilities  LAN server application software vulnerabilities and software patch updates  Rogue users on WLANs  Confidentiality of data on WLANs  LAN server configuration guidelines and standards
  • 27. Weakest Link in the Security of an IT Infrastructure User is weakest link in security Strategies for reducing risk • Check background of job candidates carefully. • Evaluate staff regularly. • Rotate access to sensitive systems, applications, and data among staff positions. • Test applications and software and review for quality • Regularly review security plans. • Perform annual security control audits. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 27
  • 28. Ethics and the Internet © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 28  Human behavior online is often less mature than in normal social settings  Demand for systems security professionals is growing so rapidly  U.S. government and Internet Architecture Board (IAB) defined a policy regarding acceptable use of Internet geared toward U.S. citizens • Policy is not a law or mandated
  • 29. IT Security Policy Framework Policy • A short written statement that defines a course of action that applies to entire organization Standard • A detailed written definition of how software and hardware are to be used Procedures • Written instructions for how to use policies and standards Guidelines • Suggested course of action for using policy, standard, or procedure © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 29
  • 30. Hierarchical IT Security Policy Framework © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 30
  • 31. Foundational IT Security Policies © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 31 Acceptable use policy (AUP)  Security awareness policy  Asset classification policy  Asset protection policy  Asset management policy  Vulnerability assessment/management  Threat assessment and monitoring
  • 32. Data about people that must be kept private Private data Information or data owned by the organization Confidential Information or data shared internally by an organization Information or data shared with the public Internal use only Public domain data © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 32 Data Classification Standards
  • 33. Summary © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 2Fundamentals of Information Systems Security www.jblearning.com All rights reserved. © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Page 33  Information systems security concepts  Confidentiality, integrity, and availability (CIA)  The seven domains of an IT infrastructure  The weakest link in the security of an IT infrastructure  IT security policy framework and data classification standard