SlideShare a Scribd company logo
1 of 22
Unit 1
Introduction to security
1
Table of Contents
• Meaning of security
• Attacks
• Computer criminals
• Methods of defense
2
• Are you Secure?
– What makes you feel secure?
• Example: Banks
– Yesterday – learning from the past
– Today
• Protecting Valuables
– Protecting Money Vs. Protecting Information
• Size and Portability (large vs. small)
• Ability to Avoid Physical Contact (lots vs. little)
• Value of Asset (very high vs. variable)
3
Meaning of Security
Developing an Understanding
• Examine the risk of security in computing
• Consider available countermeasures or
controls
• Stimulate thought about uncovered
vulnerabilities
• Identify areas where more work is needed
4
Characteristics of Computer Intrusion
 Any computer system can be a target:
 Hardware, Software, Storage, Data, People/User
 Any system is most vulnerable at its weakest point.
 Principle of Easiest Penetration - An intruder must be
expected to use any available means of penetration.
Penetration may not necessarily be by the most obvious
means, nor via the one we have the most defense
against.
 Consider all the means of penetration
 Checked repeated times
 Don’t underestimate the attacker/think like an attacker
 Strengthening one thin might weaken another
5
Attacks
 The components to attack:
 Hardware
 Software
 Data
 Vulnerability – a weakness in the security system that
could be exploited to cause harm or loss.
 Threat – a set of circumstances that has the potential to
cause loss or harm.
 Wall holding back water
 Threat to get wet
 Vulnerability is a crack in the wall
6
7
Attacks continued
• Attack – human who exploits a vulnerability
• Control – a protective measure against an
attack
• A threat is blocked by control of vulnerability
• Type of System Security Threats in computing
– Interception
– Interruption
– Modification
– Fabrication
8
9
Method, Opportunity & Motive
• Why? Who? What? When? Where?
• Attacker must have three things:
– Method – the skill, knowledge and tool
– Opportunity – the time and access
– Motive – a reason to want to perform an attack
10
Security Goals
• Secure is:
– Confidentiality (Secrecy or Privacy)- assets accessed
only by authorized parties
• Not only reading but viewing, printing or knowing about the
asset
– Integrity – assets modified only by authorized parties
• Includes writing, changing, changing the status, deleting or
creating
– Availability – assets are accessible to authorized
parties at appropriate times.
• Denial of Service
11
Confidentiality Integrity
Availability
S
CIA Triad
Confidentiality
• Use the “need to know” basis for data access
– How do we know who needs what data?
Approach: access control specifies who can access what
– How do we know a user is the person she claims to be?
Need her identity and need to verify this identity
Approach: identification and authentication
• Analogously: “need to access/use” basis for access to
physical assets
– E.g., access to a computer room, use of a desktop
• Confidentiality is:
– Difficult to ensure
– Easiest to assess in terms of success
• Binary in nature: Yes / No
Integrity
• Integrity vs. Confidentiality
– Integrity - concerned with unauthorized modification of assets (=
resources)
Confidentiality - concered with access to assets
– Integrity is more difficult to measure than confidentiality
Not binary – degrees of integrity
Context-dependent - means different things in different contexts
Could mean any subset of these asset properties:
{ precision / accuracy / currency / consistency /
meaningfulness / usefulness / ...}
• Types of integrity—an example
– A quotation from a politician
– Preserve the quotation (data integrity) but mis-attribute (origin
integrity)
Availability
• We can say that an asset (resource) is available if:
– Timely request response
– Fair allocation of resources (no starvation!)
– Fault tolerant (no total breakdown)
– Easy to use in the intended way
– Provides controlled concurrency
Vulnerabilities
 Hardware
 It is very visible
 Easy to attack
 Water, burned, frozen, gassed and electrocuted, dust,
time, rodents, environment
 Voluntary Machine Slaughter or Machinicide
 Software
 Software Deletion
 Software Modification
 Software Theft
 Malicious Modification of Software
 Logic Bomb
 Trojan Horse
 Virus
 Trapdoor
 Information leaks
 Data Vulnerabilities
 Effects everyone
 Data is more than just an electronic file
 Data Confidentiality
 Data Integrity
 Other Exposed Assets
 Networks
 Access
 Key People
18
Computer Criminals
• Amateurs
• Crackers or Hackers
• Career Criminal
• Terrorists
20
Methods of Defense
• Harm occurs when a threat is realized against a
vulnerability
• Risk – the possibility of harm
• Dealing with Harm
– Prevent it
– Deter it,
– Deflect it,
– Detect it,
– And Recover from it.
21
Conclusion
• The risks involved in computing
• The goal of secure computing: confidentiality,
integrity, availability
• The threats to security in computing: interception,
interruption, modifications, fabrication
• Controls available to address these threats:
encryption, programming controls, operating
systems, network controls, administrative
controls, laws and ethics

More Related Content

What's hot

BAIT1103 Course Overview
BAIT1103 Course OverviewBAIT1103 Course Overview
BAIT1103 Course Overviewlimsh
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hackingAgung Suwandaru
 
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญCurrent trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญBAINIDA
 
Ethical hacking-Introduction to information security.
Ethical hacking-Introduction to information security.Ethical hacking-Introduction to information security.
Ethical hacking-Introduction to information security.Kamana Tripathi
 
Introduction of network security
Introduction of network securityIntroduction of network security
Introduction of network securitysneha padhiar
 
Ethical hacking concept-Part 1
Ethical hacking concept-Part 1Ethical hacking concept-Part 1
Ethical hacking concept-Part 1Saurabh Upadhyay
 
ISACA UAE - Importance of Human-Centric Approaches to Cyber Security
ISACA UAE - Importance of Human-Centric Approaches to Cyber SecurityISACA UAE - Importance of Human-Centric Approaches to Cyber Security
ISACA UAE - Importance of Human-Centric Approaches to Cyber SecurityDr. Lydia Kostopoulos
 
Information and network security 1 introduction
Information and network security 1 introductionInformation and network security 1 introduction
Information and network security 1 introductionVaibhav Khanna
 
Technical seminar on Security
Technical seminar on Security Technical seminar on Security
Technical seminar on Security STS
 
Security in computer systems fundamentals
Security in computer systems fundamentalsSecurity in computer systems fundamentals
Security in computer systems fundamentalsManesh T
 

What's hot (19)

BAIT1103 Course Overview
BAIT1103 Course OverviewBAIT1103 Course Overview
BAIT1103 Course Overview
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Cyber
CyberCyber
Cyber
 
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญCurrent trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical hacking-Introduction to information security.
Ethical hacking-Introduction to information security.Ethical hacking-Introduction to information security.
Ethical hacking-Introduction to information security.
 
Introduction to Ethical Hacking
Introduction to Ethical HackingIntroduction to Ethical Hacking
Introduction to Ethical Hacking
 
Introduction of network security
Introduction of network securityIntroduction of network security
Introduction of network security
 
Ethical hacking concept-Part 1
Ethical hacking concept-Part 1Ethical hacking concept-Part 1
Ethical hacking concept-Part 1
 
ISACA UAE - Importance of Human-Centric Approaches to Cyber Security
ISACA UAE - Importance of Human-Centric Approaches to Cyber SecurityISACA UAE - Importance of Human-Centric Approaches to Cyber Security
ISACA UAE - Importance of Human-Centric Approaches to Cyber Security
 
Ch01
Ch01Ch01
Ch01
 
Information and network security 1 introduction
Information and network security 1 introductionInformation and network security 1 introduction
Information and network security 1 introduction
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Information Security
Information SecurityInformation Security
Information Security
 
Technical seminar on Security
Technical seminar on Security Technical seminar on Security
Technical seminar on Security
 
Security in computer systems fundamentals
Security in computer systems fundamentalsSecurity in computer systems fundamentals
Security in computer systems fundamentals
 
Graham Fairclough - Dragons, Bears and Snakes: Learning from Others
Graham Fairclough - Dragons, Bears and Snakes: Learning from OthersGraham Fairclough - Dragons, Bears and Snakes: Learning from Others
Graham Fairclough - Dragons, Bears and Snakes: Learning from Others
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Similar to Information security introduction

basic-security-concepts-what-is-security48.ppt
basic-security-concepts-what-is-security48.pptbasic-security-concepts-what-is-security48.ppt
basic-security-concepts-what-is-security48.pptPawachMetharattanara
 
Lecture 01- What is Information Security.ppt
Lecture 01- What is Information Security.pptLecture 01- What is Information Security.ppt
Lecture 01- What is Information Security.pptshahadd2021
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityShafaan Khaliq Bhatti
 
Security in Computer System
Security in Computer SystemSecurity in Computer System
Security in Computer SystemManesh T
 
Basic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpageBasic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpagenakomuri
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxRoshni814224
 
20210629_104540Information Security L1.pdf
20210629_104540Information Security L1.pdf20210629_104540Information Security L1.pdf
20210629_104540Information Security L1.pdfShyma Jugesh
 
informations_security_presentations.pptx
informations_security_presentations.pptxinformations_security_presentations.pptx
informations_security_presentations.pptxFAKHARZAMANPROUD
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdfKIYALIBAN1
 
E sec chaptr-1
E sec chaptr-1E sec chaptr-1
E sec chaptr-1123aleena
 
Module-1.ppt cryptography and network security
Module-1.ppt cryptography and network securityModule-1.ppt cryptography and network security
Module-1.ppt cryptography and network securityAparnaSunil24
 
DRC - Cybersecurity Concepts 2015 - 5 Basics you must know!
DRC  - Cybersecurity Concepts 2015 - 5 Basics you must know!DRC  - Cybersecurity Concepts 2015 - 5 Basics you must know!
DRC - Cybersecurity Concepts 2015 - 5 Basics you must know!Kevin Fisher
 
DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015T. J. Saotome
 
2.Types of Attacks.pptx
2.Types of Attacks.pptx2.Types of Attacks.pptx
2.Types of Attacks.pptxNISARSHAIKH57
 

Similar to Information security introduction (20)

basic-security-concepts-what-is-security48.ppt
basic-security-concepts-what-is-security48.pptbasic-security-concepts-what-is-security48.ppt
basic-security-concepts-what-is-security48.ppt
 
Ns lecture5: Introduction to Computer, Information, and Network Security.
Ns lecture5: Introduction to Computer, Information, and Network Security.Ns lecture5: Introduction to Computer, Information, and Network Security.
Ns lecture5: Introduction to Computer, Information, and Network Security.
 
Ch1 cse
Ch1 cseCh1 cse
Ch1 cse
 
Network Security Topic 1 intro
Network Security Topic 1 introNetwork Security Topic 1 intro
Network Security Topic 1 intro
 
Lecture 01- What is Information Security.ppt
Lecture 01- What is Information Security.pptLecture 01- What is Information Security.ppt
Lecture 01- What is Information Security.ppt
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network Security
 
Security in Computer System
Security in Computer SystemSecurity in Computer System
Security in Computer System
 
Basic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpageBasic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpage
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
computer security .ppt
computer security .pptcomputer security .ppt
computer security .ppt
 
20210629_104540Information Security L1.pdf
20210629_104540Information Security L1.pdf20210629_104540Information Security L1.pdf
20210629_104540Information Security L1.pdf
 
informations_security_presentations.pptx
informations_security_presentations.pptxinformations_security_presentations.pptx
informations_security_presentations.pptx
 
CyberSecurity101.pdf
CyberSecurity101.pdfCyberSecurity101.pdf
CyberSecurity101.pdf
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdf
 
E sec chaptr-1
E sec chaptr-1E sec chaptr-1
E sec chaptr-1
 
Module-1.ppt cryptography and network security
Module-1.ppt cryptography and network securityModule-1.ppt cryptography and network security
Module-1.ppt cryptography and network security
 
DRC - Cybersecurity Concepts 2015 - 5 Basics you must know!
DRC  - Cybersecurity Concepts 2015 - 5 Basics you must know!DRC  - Cybersecurity Concepts 2015 - 5 Basics you must know!
DRC - Cybersecurity Concepts 2015 - 5 Basics you must know!
 
DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015
 
Lecture1 intro to cs
Lecture1 intro to csLecture1 intro to cs
Lecture1 intro to cs
 
2.Types of Attacks.pptx
2.Types of Attacks.pptx2.Types of Attacks.pptx
2.Types of Attacks.pptx
 

More from G Prachi

The trusted computing architecture
The trusted computing architectureThe trusted computing architecture
The trusted computing architectureG Prachi
 
Security risk management
Security risk managementSecurity risk management
Security risk managementG Prachi
 
Mobile platform security models
Mobile platform security modelsMobile platform security models
Mobile platform security modelsG Prachi
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software securityG Prachi
 
Network defenses
Network defensesNetwork defenses
Network defensesG Prachi
 
Network protocols and vulnerabilities
Network protocols and vulnerabilitiesNetwork protocols and vulnerabilities
Network protocols and vulnerabilitiesG Prachi
 
Web application security part 02
Web application security part 02Web application security part 02
Web application security part 02G Prachi
 
Web application security part 01
Web application security part 01Web application security part 01
Web application security part 01G Prachi
 
Basic web security model
Basic web security modelBasic web security model
Basic web security modelG Prachi
 
Least privilege, access control, operating system security
Least privilege, access control, operating system securityLeast privilege, access control, operating system security
Least privilege, access control, operating system securityG Prachi
 
Dealing with legacy code
Dealing with legacy codeDealing with legacy code
Dealing with legacy codeG Prachi
 
Exploitation techniques and fuzzing
Exploitation techniques and fuzzingExploitation techniques and fuzzing
Exploitation techniques and fuzzingG Prachi
 
Control hijacking
Control hijackingControl hijacking
Control hijackingG Prachi
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security conceptsG Prachi
 
Administering security
Administering securityAdministering security
Administering securityG Prachi
 
Database security and security in networks
Database security and security in networksDatabase security and security in networks
Database security and security in networksG Prachi
 
Protection in general purpose operating system
Protection in general purpose operating systemProtection in general purpose operating system
Protection in general purpose operating systemG Prachi
 
Program security
Program securityProgram security
Program securityG Prachi
 
Elementary cryptography
Elementary cryptographyElementary cryptography
Elementary cryptographyG Prachi
 
Technology, policy, privacy and freedom
Technology, policy, privacy and freedomTechnology, policy, privacy and freedom
Technology, policy, privacy and freedomG Prachi
 

More from G Prachi (20)

The trusted computing architecture
The trusted computing architectureThe trusted computing architecture
The trusted computing architecture
 
Security risk management
Security risk managementSecurity risk management
Security risk management
 
Mobile platform security models
Mobile platform security modelsMobile platform security models
Mobile platform security models
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Network defenses
Network defensesNetwork defenses
Network defenses
 
Network protocols and vulnerabilities
Network protocols and vulnerabilitiesNetwork protocols and vulnerabilities
Network protocols and vulnerabilities
 
Web application security part 02
Web application security part 02Web application security part 02
Web application security part 02
 
Web application security part 01
Web application security part 01Web application security part 01
Web application security part 01
 
Basic web security model
Basic web security modelBasic web security model
Basic web security model
 
Least privilege, access control, operating system security
Least privilege, access control, operating system securityLeast privilege, access control, operating system security
Least privilege, access control, operating system security
 
Dealing with legacy code
Dealing with legacy codeDealing with legacy code
Dealing with legacy code
 
Exploitation techniques and fuzzing
Exploitation techniques and fuzzingExploitation techniques and fuzzing
Exploitation techniques and fuzzing
 
Control hijacking
Control hijackingControl hijacking
Control hijacking
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Administering security
Administering securityAdministering security
Administering security
 
Database security and security in networks
Database security and security in networksDatabase security and security in networks
Database security and security in networks
 
Protection in general purpose operating system
Protection in general purpose operating systemProtection in general purpose operating system
Protection in general purpose operating system
 
Program security
Program securityProgram security
Program security
 
Elementary cryptography
Elementary cryptographyElementary cryptography
Elementary cryptography
 
Technology, policy, privacy and freedom
Technology, policy, privacy and freedomTechnology, policy, privacy and freedom
Technology, policy, privacy and freedom
 

Recently uploaded

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Recently uploaded (20)

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 

Information security introduction

  • 2. Table of Contents • Meaning of security • Attacks • Computer criminals • Methods of defense 2
  • 3. • Are you Secure? – What makes you feel secure? • Example: Banks – Yesterday – learning from the past – Today • Protecting Valuables – Protecting Money Vs. Protecting Information • Size and Portability (large vs. small) • Ability to Avoid Physical Contact (lots vs. little) • Value of Asset (very high vs. variable) 3 Meaning of Security
  • 4. Developing an Understanding • Examine the risk of security in computing • Consider available countermeasures or controls • Stimulate thought about uncovered vulnerabilities • Identify areas where more work is needed 4
  • 5. Characteristics of Computer Intrusion  Any computer system can be a target:  Hardware, Software, Storage, Data, People/User  Any system is most vulnerable at its weakest point.  Principle of Easiest Penetration - An intruder must be expected to use any available means of penetration. Penetration may not necessarily be by the most obvious means, nor via the one we have the most defense against.  Consider all the means of penetration  Checked repeated times  Don’t underestimate the attacker/think like an attacker  Strengthening one thin might weaken another 5
  • 6. Attacks  The components to attack:  Hardware  Software  Data  Vulnerability – a weakness in the security system that could be exploited to cause harm or loss.  Threat – a set of circumstances that has the potential to cause loss or harm.  Wall holding back water  Threat to get wet  Vulnerability is a crack in the wall 6
  • 7. 7
  • 8. Attacks continued • Attack – human who exploits a vulnerability • Control – a protective measure against an attack • A threat is blocked by control of vulnerability • Type of System Security Threats in computing – Interception – Interruption – Modification – Fabrication 8
  • 9. 9
  • 10. Method, Opportunity & Motive • Why? Who? What? When? Where? • Attacker must have three things: – Method – the skill, knowledge and tool – Opportunity – the time and access – Motive – a reason to want to perform an attack 10
  • 11. Security Goals • Secure is: – Confidentiality (Secrecy or Privacy)- assets accessed only by authorized parties • Not only reading but viewing, printing or knowing about the asset – Integrity – assets modified only by authorized parties • Includes writing, changing, changing the status, deleting or creating – Availability – assets are accessible to authorized parties at appropriate times. • Denial of Service 11
  • 13. Confidentiality • Use the “need to know” basis for data access – How do we know who needs what data? Approach: access control specifies who can access what – How do we know a user is the person she claims to be? Need her identity and need to verify this identity Approach: identification and authentication • Analogously: “need to access/use” basis for access to physical assets – E.g., access to a computer room, use of a desktop • Confidentiality is: – Difficult to ensure – Easiest to assess in terms of success • Binary in nature: Yes / No
  • 14. Integrity • Integrity vs. Confidentiality – Integrity - concerned with unauthorized modification of assets (= resources) Confidentiality - concered with access to assets – Integrity is more difficult to measure than confidentiality Not binary – degrees of integrity Context-dependent - means different things in different contexts Could mean any subset of these asset properties: { precision / accuracy / currency / consistency / meaningfulness / usefulness / ...} • Types of integrity—an example – A quotation from a politician – Preserve the quotation (data integrity) but mis-attribute (origin integrity)
  • 15. Availability • We can say that an asset (resource) is available if: – Timely request response – Fair allocation of resources (no starvation!) – Fault tolerant (no total breakdown) – Easy to use in the intended way – Provides controlled concurrency
  • 16. Vulnerabilities  Hardware  It is very visible  Easy to attack  Water, burned, frozen, gassed and electrocuted, dust, time, rodents, environment  Voluntary Machine Slaughter or Machinicide  Software  Software Deletion  Software Modification  Software Theft
  • 17.
  • 18.  Malicious Modification of Software  Logic Bomb  Trojan Horse  Virus  Trapdoor  Information leaks  Data Vulnerabilities  Effects everyone  Data is more than just an electronic file  Data Confidentiality  Data Integrity  Other Exposed Assets  Networks  Access  Key People 18
  • 19.
  • 20. Computer Criminals • Amateurs • Crackers or Hackers • Career Criminal • Terrorists 20
  • 21. Methods of Defense • Harm occurs when a threat is realized against a vulnerability • Risk – the possibility of harm • Dealing with Harm – Prevent it – Deter it, – Deflect it, – Detect it, – And Recover from it. 21
  • 22. Conclusion • The risks involved in computing • The goal of secure computing: confidentiality, integrity, availability • The threats to security in computing: interception, interruption, modifications, fabrication • Controls available to address these threats: encryption, programming controls, operating systems, network controls, administrative controls, laws and ethics