SlideShare a Scribd company logo
Information Security : Is it an Art or a Science ?

1

by
Pankaj Rane
Research Associate(IDRBT)
AGENDA
What is Security ?
 What is Information Security ?
 Brief History : Information Security
 Present Day : InfoSec
 Why InfoSec is important ?
 What is Information Assurance ?
 Security Services
 Information States
 Security Countermeasures
 Prevention , Detection , Response
 References


2
WHAT IS SECURITY ?
 “The

quality or state of being secure to be
free from danger”
 To be protected from adversaries
 A successful organization should have
multiple layers of security in place:






Physical security
Personal security
Operations security
Communications security
Network security

3
Fig.1 Spheres of security
4
WHAT IS INFORMATION SECURITY ?






The protection of information and its critical
elements, including the systems and hardware
that use, store, and transmit that information

Tools, such as policy, awareness, training,
education, and technology are necessary
The C.I.A. triangle was the standard based on
Confidentiality, Integrity, and Availability
5
C.I.A. Triangle

6
BRIEF HISTORY OF INFORMATION SECURITY








Computer security began immediately after the
first mainframes were developed
Groups developing code-breaking computations
during World War II created the first modern
computers
Physical controls were needed to limit access to
authorized personnel to sensitive military
locations

Only limited controls were available to defend
against physical theft, espionage, and sabotage
7
The "Enigma" machines, which
scramble messages into codes,
were best known for their use
by the German military during
WWII.
Many models were made and
there were complex additions
to the machines during the
war, but British code breakers
managed to crack the "Enigma"
code.

8
PRESENT DAY : INFORMATION SECURITY

 The

Internet has brought millions of
computer networks into communication
with each other – many of them
unsecured

 Ability

to secure each now influenced by
the security on every computer to which it
is connected
9
WHY INFORMATION SECURITY IS IMPORTANT ?


Governments, commercial businesses, and individuals
are all storing information electronically






compact, instantaneous transfer, easy access

Ability to use information more efficiently has
resulted in a rapid increase in the value of
information
Information stored electronically faces new and
potentially more damaging security threats
can potentially be stolen from a remote location
 much easier to intercept and alter electronic
communication than its paper-based predecessors


10
WHAT IS INFORMATION ASSURANCE ?






The act of ensuring that data is not lost when critical
issues arise.
These issues include natural disasters,
computer/server malfunction, physical theft, or any
other instance where data has the potential of being
lost.
Common method of providing information assurance is to
have an off-site backup of the data in case one of the
mentioned issues arise.

11
SECURITY SERVICES :
WHAT TYPES OF PROBLEMS CAN OCCUR?
Confidentiality
 Integrity
 Availability
 Authentication
 Non Repudiation


12
CONFIDENTIALITY
“the assurance that information is not disclosed to
unauthorized persons, processes or devices.”

INTEGRITY
“the assurance that data can not be created, changed, or
deleted without proper authorization”
AVAILABILITY
“Timely, reliable access to data and information
services for authorized users.”
AUTHENTICATION
“Designed to establish the validity of a transmission,
message, or originator, or a means of verifying an
individual’s authorizations to receive specific categories
of information”

13
NON-REPUDIATION
“The assurance the sender of the data is provided with proof of
delivery and the recipient is provided with proof of the sender’s
identity, so neither can later deny having processed the data”
Examples where non-repudiation is lacking include:
- An online shopper purchases and downloads a software package,
but later claims he never downloaded it.
- An online shopper purchases and downloads a software package
that he later finds out was corrupted, but he later finds out the
seller was not who he expected, but instead was a “man in the
middle”.

14
INFORMATION STATES :
WHERE IS THE DATA?
Transmission
 Storage
 Processing


15
TRANSMISSION
Time in which the data is in transit between processing/process
steps.

STORAGE
Time during which data is on a persistent medium such as a
hard drive or tape.

PROCESSING
Time during which the data is actually in the control of a
processing step.

16
Fig.NSTISSC Security Model

17
SECURITY COUNTERMEASURES :
WHO CAN ENFORCE /CHECK SECURITY?

People
 Policy and Practice
 Technology


18
PEOPLE

The heart and soul of secure systems.
 Awareness, literacy, training, education in sound
practice.
 Must follow policy and practice or the systems
will be compromised no matter how good the
design!
 Both strength and vulnerability.


19
POLICY AND PRACTICE

System users
 System administrators
 Software conventions
 Trust validation


20
TECHNOLOGY


Evolves rapidly



Crypto systems



Hardware



Software



Network







Platform






Firewalls
Routers
Intrusion detection
Other….
Operating systems
Transaction monitoring
Other….

Especially vulnerable to misconfiguration and other “human”
errors.
21
PREVENTION


Establishment of policy and access control
who: identification, authentication, authorization
 what: granted on “need-to-know” basis




Implementation of hardware, software, and
services
users cannot override, unalterable (attackers cannot
defeat security mechanisms by changing them)
 examples of preventative mechanisms


passwords - prevent unauthorized system access
 firewalls
- prevent unauthorized network access
 encryption - prevents breaches of confidentiality
 physical security devices - prevent theft




Maintenance
22
PREVENTION IS NOT ENOUGH!
Prevention systems are never perfect.
No bank ever says: "Our safe is so good, we don't need
an alarm system."
No museum ever says: "Our door and window locks are
so good, we don't need night watchmen.“
Detection and response are how we get security in
the real world, and they're the only way we can possibly
get security in the cyberspace world.
Bruce Schneier,
Counterpane Internet Security, Inc.

23
DETECTION
Determine that either an attack is underway or
has occurred and report it
 Real-time monitoring


or, as close as possible
 monitor attacks to provide data about their nature,
severity, and results




Intrusion verification and notification
intrusion detection systems (IDS)
 typical detection systems monitor various aspects of
the system, looking for actions or information
indicating an attack




example: denial of access to a system when user repeatedly
enters incorrect password
24
RESPONSE


Stop/contain an attack


must be timely!


incident response plan developed in advance

Assess and repair any damage
 Resumption of correct operation
 Evidence collection and preservation




very important
identifies vulnerabilities
 strengthens future security measures


25
REFERENCES
[1] http://www.informit.com/isapi/articles/index.asp {InformIT Reference
Guides}
[2]http://www.cs.duke.edu/courses/summer04/cps001/lectures/Lecture15.ppt
[3]http://www.acc.ncku.edu.tw/chinese/faculty/shulc/courses/cas/Whitman/ch
ap01.ppt

[4] http://en.wikipedia.org/wiki/Information_security
[5] http://en.wikipedia.org/wiki/NSTISSC

26
THANK YOU !!!

27
QUERIES ???

28

More Related Content

What's hot

cyber security
cyber security cyber security
cyber security
NiharikaVoleti
 
Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Security
chauhankapil
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
Nikolaos Georgitsopoulos
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
Chapter 11 laws and ethic information security
Chapter 11   laws and ethic information securityChapter 11   laws and ethic information security
Chapter 11 laws and ethic information security
Syaiful Ahdan
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
G Prachi
 
Information Security
Information SecurityInformation Security
Information Security
Dhilsath Fathima
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
belsis
 
Legal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityLegal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information Security
Carl Ceder
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
shindept123
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Vaishak Chandran
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Ranjana Adhikari
 
Cyber security
Cyber securityCyber security
Cyber security
Samsil Arefin
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Vivek Agarwal
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
Gaurang Rathod
 
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Dheeraj Kataria
 
Security risk management
Security risk managementSecurity risk management
Security risk management
G Prachi
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
Kandarp Shah
 
Legal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information SecurityLegal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information Security
Gamentortc
 
Cyber security
Cyber securityCyber security
Cyber security
Harsh verma
 

What's hot (20)

cyber security
cyber security cyber security
cyber security
 
Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Security
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Chapter 11 laws and ethic information security
Chapter 11   laws and ethic information securityChapter 11   laws and ethic information security
Chapter 11 laws and ethic information security
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Information Security
Information SecurityInformation Security
Information Security
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Legal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityLegal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information Security
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
 
Security risk management
Security risk managementSecurity risk management
Security risk management
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Legal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information SecurityLegal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information Security
 
Cyber security
Cyber securityCyber security
Cyber security
 

Viewers also liked

Information System Security
Information System Security Information System Security
Information System Security
Syed Asif Sherazi
 
Information security
Information securityInformation security
Information security
Vijayananda Mohire
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security Program
Shauna_Cox
 
Cia security model
Cia security modelCia security model
Cia security model
Imran Ahmed
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
R_Yanus
 
Pervasive computing and its Security Issues
Pervasive computing and its Security IssuesPervasive computing and its Security Issues
Pervasive computing and its Security Issues
Phearin Sok
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
Faheem Ul Hasan
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Stephen Cobb
 
Information security management
Information security managementInformation security management
Information security management
UMaine
 
Security testing
Security testingSecurity testing
Security testing
baskar p
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
Dr. Loganathan R
 
Cissp d5-cryptography v2012-mini coursev2
Cissp d5-cryptography v2012-mini coursev2Cissp d5-cryptography v2012-mini coursev2
Cissp d5-cryptography v2012-mini coursev2
infosecedu
 
Asset, Vulnerability, Threat, Risk & Control
Asset, Vulnerability, Threat, Risk & ControlAsset, Vulnerability, Threat, Risk & Control
Asset, Vulnerability, Threat, Risk & Control
Muhammad Faisal Naqvi, CISSP, CISA, AMBCI, ITIL, ISMS LA n Master
 
Information security for dummies
Information security for dummiesInformation security for dummies
Information security for dummies
Ivo Depoorter
 
Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Webinar - Crafting IT Security Policy Apr 2015Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Innovators
 
Physical Security Presentation
Physical Security PresentationPhysical Security Presentation
Physical Security Presentation
Wajahat Rajab
 

Viewers also liked (16)

Information System Security
Information System Security Information System Security
Information System Security
 
Information security
Information securityInformation security
Information security
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security Program
 
Cia security model
Cia security modelCia security model
Cia security model
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Pervasive computing and its Security Issues
Pervasive computing and its Security IssuesPervasive computing and its Security Issues
Pervasive computing and its Security Issues
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Information security management
Information security managementInformation security management
Information security management
 
Security testing
Security testingSecurity testing
Security testing
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Cissp d5-cryptography v2012-mini coursev2
Cissp d5-cryptography v2012-mini coursev2Cissp d5-cryptography v2012-mini coursev2
Cissp d5-cryptography v2012-mini coursev2
 
Asset, Vulnerability, Threat, Risk & Control
Asset, Vulnerability, Threat, Risk & ControlAsset, Vulnerability, Threat, Risk & Control
Asset, Vulnerability, Threat, Risk & Control
 
Information security for dummies
Information security for dummiesInformation security for dummies
Information security for dummies
 
Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Webinar - Crafting IT Security Policy Apr 2015Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Webinar - Crafting IT Security Policy Apr 2015
 
Physical Security Presentation
Physical Security PresentationPhysical Security Presentation
Physical Security Presentation
 

Similar to Information Security : Is it an Art or a Science

internet security and cyber lawUnit1
internet security and  cyber lawUnit1internet security and  cyber lawUnit1
internet security and cyber lawUnit1
Royalzig Luxury Furniture
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
KnownId
 
Information security
Information securityInformation security
Information security
Onkar Sule
 
security IDS
security IDSsecurity IDS
security IDS
Gregory Hanis
 
Chapter 1 - Introduction.pdf
Chapter 1 - Introduction.pdfChapter 1 - Introduction.pdf
Chapter 1 - Introduction.pdf
EthioDotNetDeveloper
 
Lecture 01- What is Information Security.ppt
Lecture 01- What is Information Security.pptLecture 01- What is Information Security.ppt
Lecture 01- What is Information Security.ppt
shahadd2021
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
Mukesh Chinta
 
Concept Of Cyber Security.pdf
Concept Of Cyber Security.pdfConcept Of Cyber Security.pdf
Concept Of Cyber Security.pdf
FahadZaman38
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
Zara Nawaz
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
Zara Nawaz
 
Cybersecurity Vs Information Security.pptx
Cybersecurity Vs Information Security.pptxCybersecurity Vs Information Security.pptx
Cybersecurity Vs Information Security.pptx
Infosectrain3
 
Introduction to cyber security.pptx
Introduction to cyber security.pptxIntroduction to cyber security.pptx
Introduction to cyber security.pptx
SharmaAnirudh2
 
Lecture 1-2.pdf
Lecture 1-2.pdfLecture 1-2.pdf
Lecture 1-2.pdf
FumikageTokoyami4
 
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdfUNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
VishwanathMahalle
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
Jazmine Brown
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
Careerera
 
An Empirical Study on Information Security
An Empirical Study on Information SecurityAn Empirical Study on Information Security
An Empirical Study on Information Security
ijtsrd
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
MiltonBiswas8
 
Security Ch-1.pptx
Security Ch-1.pptxSecurity Ch-1.pptx
Security Ch-1.pptx
KeenboonAsaffaa
 
1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf
Rimurutempest594985
 

Similar to Information Security : Is it an Art or a Science (20)

internet security and cyber lawUnit1
internet security and  cyber lawUnit1internet security and  cyber lawUnit1
internet security and cyber lawUnit1
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
Information security
Information securityInformation security
Information security
 
security IDS
security IDSsecurity IDS
security IDS
 
Chapter 1 - Introduction.pdf
Chapter 1 - Introduction.pdfChapter 1 - Introduction.pdf
Chapter 1 - Introduction.pdf
 
Lecture 01- What is Information Security.ppt
Lecture 01- What is Information Security.pptLecture 01- What is Information Security.ppt
Lecture 01- What is Information Security.ppt
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Concept Of Cyber Security.pdf
Concept Of Cyber Security.pdfConcept Of Cyber Security.pdf
Concept Of Cyber Security.pdf
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
 
Cybersecurity Vs Information Security.pptx
Cybersecurity Vs Information Security.pptxCybersecurity Vs Information Security.pptx
Cybersecurity Vs Information Security.pptx
 
Introduction to cyber security.pptx
Introduction to cyber security.pptxIntroduction to cyber security.pptx
Introduction to cyber security.pptx
 
Lecture 1-2.pdf
Lecture 1-2.pdfLecture 1-2.pdf
Lecture 1-2.pdf
 
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdfUNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
An Empirical Study on Information Security
An Empirical Study on Information SecurityAn Empirical Study on Information Security
An Empirical Study on Information Security
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
Security Ch-1.pptx
Security Ch-1.pptxSecurity Ch-1.pptx
Security Ch-1.pptx
 
1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf
 

Recently uploaded

Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 

Recently uploaded (20)

Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 

Information Security : Is it an Art or a Science

  • 1. Information Security : Is it an Art or a Science ? 1 by Pankaj Rane Research Associate(IDRBT)
  • 2. AGENDA What is Security ?  What is Information Security ?  Brief History : Information Security  Present Day : InfoSec  Why InfoSec is important ?  What is Information Assurance ?  Security Services  Information States  Security Countermeasures  Prevention , Detection , Response  References  2
  • 3. WHAT IS SECURITY ?  “The quality or state of being secure to be free from danger”  To be protected from adversaries  A successful organization should have multiple layers of security in place:      Physical security Personal security Operations security Communications security Network security 3
  • 4. Fig.1 Spheres of security 4
  • 5. WHAT IS INFORMATION SECURITY ?    The protection of information and its critical elements, including the systems and hardware that use, store, and transmit that information Tools, such as policy, awareness, training, education, and technology are necessary The C.I.A. triangle was the standard based on Confidentiality, Integrity, and Availability 5
  • 7. BRIEF HISTORY OF INFORMATION SECURITY     Computer security began immediately after the first mainframes were developed Groups developing code-breaking computations during World War II created the first modern computers Physical controls were needed to limit access to authorized personnel to sensitive military locations Only limited controls were available to defend against physical theft, espionage, and sabotage 7
  • 8. The "Enigma" machines, which scramble messages into codes, were best known for their use by the German military during WWII. Many models were made and there were complex additions to the machines during the war, but British code breakers managed to crack the "Enigma" code. 8
  • 9. PRESENT DAY : INFORMATION SECURITY  The Internet has brought millions of computer networks into communication with each other – many of them unsecured  Ability to secure each now influenced by the security on every computer to which it is connected 9
  • 10. WHY INFORMATION SECURITY IS IMPORTANT ?  Governments, commercial businesses, and individuals are all storing information electronically    compact, instantaneous transfer, easy access Ability to use information more efficiently has resulted in a rapid increase in the value of information Information stored electronically faces new and potentially more damaging security threats can potentially be stolen from a remote location  much easier to intercept and alter electronic communication than its paper-based predecessors  10
  • 11. WHAT IS INFORMATION ASSURANCE ?    The act of ensuring that data is not lost when critical issues arise. These issues include natural disasters, computer/server malfunction, physical theft, or any other instance where data has the potential of being lost. Common method of providing information assurance is to have an off-site backup of the data in case one of the mentioned issues arise. 11
  • 12. SECURITY SERVICES : WHAT TYPES OF PROBLEMS CAN OCCUR? Confidentiality  Integrity  Availability  Authentication  Non Repudiation  12
  • 13. CONFIDENTIALITY “the assurance that information is not disclosed to unauthorized persons, processes or devices.” INTEGRITY “the assurance that data can not be created, changed, or deleted without proper authorization” AVAILABILITY “Timely, reliable access to data and information services for authorized users.” AUTHENTICATION “Designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual’s authorizations to receive specific categories of information” 13
  • 14. NON-REPUDIATION “The assurance the sender of the data is provided with proof of delivery and the recipient is provided with proof of the sender’s identity, so neither can later deny having processed the data” Examples where non-repudiation is lacking include: - An online shopper purchases and downloads a software package, but later claims he never downloaded it. - An online shopper purchases and downloads a software package that he later finds out was corrupted, but he later finds out the seller was not who he expected, but instead was a “man in the middle”. 14
  • 15. INFORMATION STATES : WHERE IS THE DATA? Transmission  Storage  Processing  15
  • 16. TRANSMISSION Time in which the data is in transit between processing/process steps. STORAGE Time during which data is on a persistent medium such as a hard drive or tape. PROCESSING Time during which the data is actually in the control of a processing step. 16
  • 18. SECURITY COUNTERMEASURES : WHO CAN ENFORCE /CHECK SECURITY? People  Policy and Practice  Technology  18
  • 19. PEOPLE The heart and soul of secure systems.  Awareness, literacy, training, education in sound practice.  Must follow policy and practice or the systems will be compromised no matter how good the design!  Both strength and vulnerability.  19
  • 20. POLICY AND PRACTICE System users  System administrators  Software conventions  Trust validation  20
  • 21. TECHNOLOGY  Evolves rapidly  Crypto systems  Hardware  Software  Network      Platform     Firewalls Routers Intrusion detection Other…. Operating systems Transaction monitoring Other…. Especially vulnerable to misconfiguration and other “human” errors. 21
  • 22. PREVENTION  Establishment of policy and access control who: identification, authentication, authorization  what: granted on “need-to-know” basis   Implementation of hardware, software, and services users cannot override, unalterable (attackers cannot defeat security mechanisms by changing them)  examples of preventative mechanisms  passwords - prevent unauthorized system access  firewalls - prevent unauthorized network access  encryption - prevents breaches of confidentiality  physical security devices - prevent theft   Maintenance 22
  • 23. PREVENTION IS NOT ENOUGH! Prevention systems are never perfect. No bank ever says: "Our safe is so good, we don't need an alarm system." No museum ever says: "Our door and window locks are so good, we don't need night watchmen.“ Detection and response are how we get security in the real world, and they're the only way we can possibly get security in the cyberspace world. Bruce Schneier, Counterpane Internet Security, Inc. 23
  • 24. DETECTION Determine that either an attack is underway or has occurred and report it  Real-time monitoring  or, as close as possible  monitor attacks to provide data about their nature, severity, and results   Intrusion verification and notification intrusion detection systems (IDS)  typical detection systems monitor various aspects of the system, looking for actions or information indicating an attack   example: denial of access to a system when user repeatedly enters incorrect password 24
  • 25. RESPONSE  Stop/contain an attack  must be timely!  incident response plan developed in advance Assess and repair any damage  Resumption of correct operation  Evidence collection and preservation   very important identifies vulnerabilities  strengthens future security measures  25
  • 26. REFERENCES [1] http://www.informit.com/isapi/articles/index.asp {InformIT Reference Guides} [2]http://www.cs.duke.edu/courses/summer04/cps001/lectures/Lecture15.ppt [3]http://www.acc.ncku.edu.tw/chinese/faculty/shulc/courses/cas/Whitman/ch ap01.ppt [4] http://en.wikipedia.org/wiki/Information_security [5] http://en.wikipedia.org/wiki/NSTISSC 26