SlideShare a Scribd company logo
1 of 20
Principles of Information Security,
Fifth Edition
Chapter 1
Introduction to Information Security
Lesson 1 - Introduction
Learning Objectives
Upon completion of this lesson, you should be able
to:
◦ Define information security
◦ Recount the history of computer security and how it
evolved into information security
PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 2
Introduction
Information security: a “well-informed sense of
assurance that the information risks and controls
are in balance.”—Jim Anderson, Emagined Security,
Inc.
Security professionals must review the origins of
this field to understand its impact on our
understanding of information security today.
PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 3
The History of Information
Security
Computer security began immediately after the
first mainframes were developed.
◦ Groups developing code-breaking computations during
World War II created the first modern computers.
◦ Multiple levels of security were implemented.
Physical controls limiting access to sensitive
military locations to authorized personnel
Rudimentary in defending against physical theft,
espionage, and sabotage
PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 4
PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 5
PRINCIPLES OF INFORMATION
SECURITY, FIFTH EDITION
6
Figure 1-1 – The Enigma
The 1960s
Advanced Research Project Agency (ARPA) began to
examine the feasibility of redundant networked
communications.
Larry Roberts developed the ARPANET from its
inception.
PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 7
Figure 1-2 - ARPANET
PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 8
The 1970s and 80s
ARPANET grew in popularity, as did its potential for
misuse.
Fundamental problems with ARPANET security
were identified.
◦ No safety procedures for dial-up connections to ARPANET
◦ Nonexistent user identification and authorization to
system
PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 9
The 1970s and 80s (cont’d)
Information security began with Rand Report R-609
(paper that started the study of computer security
and identified the role of management and policy
issues in it).
The scope of computer security grew from physical
security to include:
◦ Securing the data
◦ Limiting random and unauthorized access to data
◦ Involving personnel from multiple levels of the
organization in information security
PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 10
PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 11
MULTICS
Early focus of computer security research centered on a system
called Multiplexed Information and Computing Service (MULTICS).
First operating system was created with security integrated into core
functions.
Mainframe, time-sharing OS was developed in the mid-1960s by
General Electric (GE), Bell Labs, and Massachusetts Institute of
Technology (MIT).
Several MULTICS key players created UNIX.
◦ Primary purpose of UNIX was text processing.
Late 1970s: The microprocessor expanded computing capabilities
and security threats.
PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 12
The 1990s
Networks of computers became more common, as did the
need to connect them to each other.
Internet became the first global network of networks.
Initially, network connections were based on de facto
standards.
In early Internet deployments, security was treated as a low
priority.
In 1993, DEFCON conference was established for those
interested in information security.
PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 13
2000 to Present
The Internet brings millions of unsecured
computer networks into continuous
communication with each other.
The ability to secure a computer’s data was
influenced by the security of every computer to
which it is connected.
Growing threat of cyber attacks has increased the
awareness of need for improved security.
◦ Nation-states engaging in information warfare
PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 14
What Is Security?
“A state of being secure and free from danger or harm;
the actions taken to make someone or something
secure.”
A successful organization should have multiple layers
of security in place to protect:
◦ Operations
◦ Physical infrastructure
◦ People
◦ Functions
◦ Communications
◦ Information
PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 15
What Is Security? (cont’d)
The protection of information and its critical
elements, including systems and hardware that
use, store, and transmit that information
Includes information security management, data
security, and network security
C.I.A. triangle
◦ Is a standard based on confidentiality, integrity, and
availability, now viewed as inadequate.
◦ Expanded model consists of a list of critical characteristics
of information.
PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 16
PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 17
Key Information Security
Concepts
• Access
• Asset
• Attack
• Control, safeguard, or
countermeasure
• Exploit
• Exposure
• Loss
PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 18
• Protection profile or
security posture
• Risk
• Subjects and objects
• Threat
• Threat agent
• Vulnerability
PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 19
Key Information Security
Concepts (cont’d)
A computer can be the subject of an
attack and/or the object of an attack.
◦When the subject of an attack, the
computer is used as an active tool to
conduct attack.
◦When the object of an attack, the
computer is the entity being attacked.
PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 20

More Related Content

What's hot

Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to securityDhani Ahmad
 
Network Security
Network SecurityNetwork Security
Network SecurityMAJU
 
Security vulnerability
Security vulnerabilitySecurity vulnerability
Security vulnerabilityA. Shamel
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standardsprimeteacher32
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 pptvasanthimuniasamy
 
Security and information assurance
Security and information assuranceSecurity and information assurance
Security and information assurancebdemchak
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityjayashri kolekar
 
System Administration: Introduction to system administration
System Administration: Introduction to system administrationSystem Administration: Introduction to system administration
System Administration: Introduction to system administrationKhang-Ling Loh
 
Legal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information SecurityLegal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information SecurityGamentortc
 
Security risk management
Security risk managementSecurity risk management
Security risk managementG Prachi
 
Security and personnel bp11521
Security and personnel bp11521Security and personnel bp11521
Security and personnel bp11521Merlin Florrence
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management Ersoy AKSOY
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
Chapter 5 Planning for Security-students.ppt
Chapter 5 Planning for Security-students.pptChapter 5 Planning for Security-students.ppt
Chapter 5 Planning for Security-students.pptShruthi48
 
Application development and emerging technologies.pptx
Application development and emerging technologies.pptxApplication development and emerging technologies.pptx
Application development and emerging technologies.pptxMichael Angelo Marasigan
 

What's hot (20)

Security policy
Security policySecurity policy
Security policy
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Security policies
Security policiesSecurity policies
Security policies
 
Security vulnerability
Security vulnerabilitySecurity vulnerability
Security vulnerability
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
 
Security and information assurance
Security and information assuranceSecurity and information assurance
Security and information assurance
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Ethics in-information-security
Ethics in-information-securityEthics in-information-security
Ethics in-information-security
 
System Administration: Introduction to system administration
System Administration: Introduction to system administrationSystem Administration: Introduction to system administration
System Administration: Introduction to system administration
 
Legal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information SecurityLegal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information Security
 
Security risk management
Security risk managementSecurity risk management
Security risk management
 
Network security
Network securityNetwork security
Network security
 
Security and personnel bp11521
Security and personnel bp11521Security and personnel bp11521
Security and personnel bp11521
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 
Systems Administration
Systems AdministrationSystems Administration
Systems Administration
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Chapter 5 Planning for Security-students.ppt
Chapter 5 Planning for Security-students.pptChapter 5 Planning for Security-students.ppt
Chapter 5 Planning for Security-students.ppt
 
Application development and emerging technologies.pptx
Application development and emerging technologies.pptxApplication development and emerging technologies.pptx
Application development and emerging technologies.pptx
 

Similar to Introduction to Information Security History and Principles

IT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesIT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesAsst.prof M.Gokilavani
 
IT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdfIT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdfAsst.prof M.Gokilavani
 
60304756 whitman-ch01-1
60304756 whitman-ch01-160304756 whitman-ch01-1
60304756 whitman-ch01-1UDCNTT
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityDhani Ahmad
 
Ch01_Introduction_to_Information_Securit.ppt
Ch01_Introduction_to_Information_Securit.pptCh01_Introduction_to_Information_Securit.ppt
Ch01_Introduction_to_Information_Securit.pptTayyab AlEe
 
Ch01_Introduction_to_Information_Securit.ppt
Ch01_Introduction_to_Information_Securit.pptCh01_Introduction_to_Information_Securit.ppt
Ch01_Introduction_to_Information_Securit.pptTayyab AlEe
 
Information Security : Is it an Art or a Science
Information Security : Is it an Art or a ScienceInformation Security : Is it an Art or a Science
Information Security : Is it an Art or a SciencePankaj Rane
 
Information security fundamentals topic 2: Evolution of Information security
Information security fundamentals topic 2: Evolution of Information securityInformation security fundamentals topic 2: Evolution of Information security
Information security fundamentals topic 2: Evolution of Information securityNeha Raju k
 
information-security-3rd-edition2-define-information-security.ppt
information-security-3rd-edition2-define-information-security.pptinformation-security-3rd-edition2-define-information-security.ppt
information-security-3rd-edition2-define-information-security.pptMuhammadAbdullah311866
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityElumalai Vasan
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityBryCunal
 
RaoNayakShelve inNetworkingSecurityUser levelB.docx
RaoNayakShelve inNetworkingSecurityUser levelB.docxRaoNayakShelve inNetworkingSecurityUser levelB.docx
RaoNayakShelve inNetworkingSecurityUser levelB.docxaudeleypearl
 

Similar to Introduction to Information Security History and Principles (20)

IT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesIT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notes
 
IT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdfIT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdf
 
Is ch1 (2)
Is ch1 (2)Is ch1 (2)
Is ch1 (2)
 
60304756 whitman-ch01-1
60304756 whitman-ch01-160304756 whitman-ch01-1
60304756 whitman-ch01-1
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Ch01_Introduction_to_Information_Securit.ppt
Ch01_Introduction_to_Information_Securit.pptCh01_Introduction_to_Information_Securit.ppt
Ch01_Introduction_to_Information_Securit.ppt
 
Ch01_Introduction_to_Information_Securit.ppt
Ch01_Introduction_to_Information_Securit.pptCh01_Introduction_to_Information_Securit.ppt
Ch01_Introduction_to_Information_Securit.ppt
 
Information Security : Is it an Art or a Science
Information Security : Is it an Art or a ScienceInformation Security : Is it an Art or a Science
Information Security : Is it an Art or a Science
 
Lecture 1-2.pdf
Lecture 1-2.pdfLecture 1-2.pdf
Lecture 1-2.pdf
 
Information security fundamentals topic 2: Evolution of Information security
Information security fundamentals topic 2: Evolution of Information securityInformation security fundamentals topic 2: Evolution of Information security
Information security fundamentals topic 2: Evolution of Information security
 
information-security-3rd-edition2-define-information-security.ppt
information-security-3rd-edition2-define-information-security.pptinformation-security-3rd-edition2-define-information-security.ppt
information-security-3rd-edition2-define-information-security.ppt
 
MIS 7.pptx
MIS 7.pptxMIS 7.pptx
MIS 7.pptx
 
Information security.pptx
Information security.pptxInformation security.pptx
Information security.pptx
 
Jb ia
Jb   iaJb   ia
Jb ia
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
The Cybersecurity Mess
The Cybersecurity MessThe Cybersecurity Mess
The Cybersecurity Mess
 
Forensics
ForensicsForensics
Forensics
 
RaoNayakShelve inNetworkingSecurityUser levelB.docx
RaoNayakShelve inNetworkingSecurityUser levelB.docxRaoNayakShelve inNetworkingSecurityUser levelB.docx
RaoNayakShelve inNetworkingSecurityUser levelB.docx
 
internet security and cyber lawUnit1
internet security and  cyber lawUnit1internet security and  cyber lawUnit1
internet security and cyber lawUnit1
 

More from MLG College of Learning, Inc (20)

PC111.Lesson2
PC111.Lesson2PC111.Lesson2
PC111.Lesson2
 
PC111.Lesson1
PC111.Lesson1PC111.Lesson1
PC111.Lesson1
 
PC111-lesson1.pptx
PC111-lesson1.pptxPC111-lesson1.pptx
PC111-lesson1.pptx
 
PC LEESOON 6.pptx
PC LEESOON 6.pptxPC LEESOON 6.pptx
PC LEESOON 6.pptx
 
PC 106 PPT-09.pptx
PC 106 PPT-09.pptxPC 106 PPT-09.pptx
PC 106 PPT-09.pptx
 
PC 106 PPT-07
PC 106 PPT-07PC 106 PPT-07
PC 106 PPT-07
 
PC 106 PPT-01
PC 106 PPT-01PC 106 PPT-01
PC 106 PPT-01
 
PC 106 PPT-06
PC 106 PPT-06PC 106 PPT-06
PC 106 PPT-06
 
PC 106 PPT-05
PC 106 PPT-05PC 106 PPT-05
PC 106 PPT-05
 
PC 106 Slide 04
PC 106 Slide 04PC 106 Slide 04
PC 106 Slide 04
 
PC 106 Slide no.02
PC 106 Slide no.02PC 106 Slide no.02
PC 106 Slide no.02
 
pc-106-slide-3
pc-106-slide-3pc-106-slide-3
pc-106-slide-3
 
PC 106 Slide 2
PC 106 Slide 2PC 106 Slide 2
PC 106 Slide 2
 
PC 106 Slide 1.pptx
PC 106 Slide 1.pptxPC 106 Slide 1.pptx
PC 106 Slide 1.pptx
 
Db2 characteristics of db ms
Db2 characteristics of db msDb2 characteristics of db ms
Db2 characteristics of db ms
 
Db1 introduction
Db1 introductionDb1 introduction
Db1 introduction
 
Lesson 3.2
Lesson 3.2Lesson 3.2
Lesson 3.2
 
Lesson 3.1
Lesson 3.1Lesson 3.1
Lesson 3.1
 
Lesson 1.6
Lesson 1.6Lesson 1.6
Lesson 1.6
 
Lesson 3.2
Lesson 3.2Lesson 3.2
Lesson 3.2
 

Recently uploaded

Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 

Recently uploaded (20)

Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 

Introduction to Information Security History and Principles

  • 1. Principles of Information Security, Fifth Edition Chapter 1 Introduction to Information Security Lesson 1 - Introduction
  • 2. Learning Objectives Upon completion of this lesson, you should be able to: ◦ Define information security ◦ Recount the history of computer security and how it evolved into information security PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 2
  • 3. Introduction Information security: a “well-informed sense of assurance that the information risks and controls are in balance.”—Jim Anderson, Emagined Security, Inc. Security professionals must review the origins of this field to understand its impact on our understanding of information security today. PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 3
  • 4. The History of Information Security Computer security began immediately after the first mainframes were developed. ◦ Groups developing code-breaking computations during World War II created the first modern computers. ◦ Multiple levels of security were implemented. Physical controls limiting access to sensitive military locations to authorized personnel Rudimentary in defending against physical theft, espionage, and sabotage PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 4
  • 5. PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 5
  • 6. PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 6 Figure 1-1 – The Enigma
  • 7. The 1960s Advanced Research Project Agency (ARPA) began to examine the feasibility of redundant networked communications. Larry Roberts developed the ARPANET from its inception. PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 7
  • 8. Figure 1-2 - ARPANET PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 8
  • 9. The 1970s and 80s ARPANET grew in popularity, as did its potential for misuse. Fundamental problems with ARPANET security were identified. ◦ No safety procedures for dial-up connections to ARPANET ◦ Nonexistent user identification and authorization to system PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 9
  • 10. The 1970s and 80s (cont’d) Information security began with Rand Report R-609 (paper that started the study of computer security and identified the role of management and policy issues in it). The scope of computer security grew from physical security to include: ◦ Securing the data ◦ Limiting random and unauthorized access to data ◦ Involving personnel from multiple levels of the organization in information security PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 10
  • 11. PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 11
  • 12. MULTICS Early focus of computer security research centered on a system called Multiplexed Information and Computing Service (MULTICS). First operating system was created with security integrated into core functions. Mainframe, time-sharing OS was developed in the mid-1960s by General Electric (GE), Bell Labs, and Massachusetts Institute of Technology (MIT). Several MULTICS key players created UNIX. ◦ Primary purpose of UNIX was text processing. Late 1970s: The microprocessor expanded computing capabilities and security threats. PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 12
  • 13. The 1990s Networks of computers became more common, as did the need to connect them to each other. Internet became the first global network of networks. Initially, network connections were based on de facto standards. In early Internet deployments, security was treated as a low priority. In 1993, DEFCON conference was established for those interested in information security. PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 13
  • 14. 2000 to Present The Internet brings millions of unsecured computer networks into continuous communication with each other. The ability to secure a computer’s data was influenced by the security of every computer to which it is connected. Growing threat of cyber attacks has increased the awareness of need for improved security. ◦ Nation-states engaging in information warfare PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 14
  • 15. What Is Security? “A state of being secure and free from danger or harm; the actions taken to make someone or something secure.” A successful organization should have multiple layers of security in place to protect: ◦ Operations ◦ Physical infrastructure ◦ People ◦ Functions ◦ Communications ◦ Information PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 15
  • 16. What Is Security? (cont’d) The protection of information and its critical elements, including systems and hardware that use, store, and transmit that information Includes information security management, data security, and network security C.I.A. triangle ◦ Is a standard based on confidentiality, integrity, and availability, now viewed as inadequate. ◦ Expanded model consists of a list of critical characteristics of information. PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 16
  • 17. PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 17
  • 18. Key Information Security Concepts • Access • Asset • Attack • Control, safeguard, or countermeasure • Exploit • Exposure • Loss PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 18 • Protection profile or security posture • Risk • Subjects and objects • Threat • Threat agent • Vulnerability
  • 19. PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 19
  • 20. Key Information Security Concepts (cont’d) A computer can be the subject of an attack and/or the object of an attack. ◦When the subject of an attack, the computer is used as an active tool to conduct attack. ◦When the object of an attack, the computer is the entity being attacked. PRINCIPLES OF INFORMATION SECURITY, FIFTH EDITION 20