Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 1: Why Study Information Security?

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Cryptography and Network Security Chapter 1
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not.
Computer and Information Security
Computer and Information Security Jen-Chang Liu, 2004
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Introduction (Pendahuluan)  Information Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Pertemuan 02 Aspek dasar keamanan Jaringan dan ketentuan baku OSI
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security Chapter 1
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings.
Introduction (Based on Lecture slides by J. H. Wang)
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Network Security Essentials Chapter 1
Network Security Essentials Chapter 1 Fourth Edition by William Stallings (Based on Lecture slides by Lawrie Brown)
Network Security Essentials Chapter 1
Chapter 1 Overview. The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not on.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”
Cryptography and Network Security (CS435) Part One (Introduction)
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Presented by: Dr. Munam Ali Shah
Network Security Introduction
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 3: Certification Programs and the Common Body of Knowledge.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
Introduction (Pendahuluan)  Information Security  Criptography.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Cryptography and Network Security
CS457 Introduction to Information Security Systems
Information Security Principles and Practices
By Marwan Al-Namari Author: William Stallings
Cryptography and Network Security
Information System and Network Security
Information Security.
UNIT I INTRODUCTION Growing IT Security Importance and New Career Opportunities – Becoming an Information Security Specialist – Conceptualizing.
Data & Network Security
CNET334 - Network Security
Introduction Of Information Security
Information and Network Security
10CS835 Information Security
Cryptography and Network Security Chapter 1
Cryptography and Network Security Chapter 1
Cryptography and Network Security Chapter 1
Cryptography and Network Security
Cryptography and Network Security Chapter 1
Cryptography and Network Security Chapter 1
Introduction to Cryptography
The OSI Security Architecture
Cryptography and Network Security
Cryptography and Network Security Chapter 1
Presentation transcript:

Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 1: Why Study Information Security?

Chapter 1 Chapter 1: Why Study Information Security? © Pearson Education Information Security: Principles and Practices 2

3 Objectives Recognize the growing importance of information security specialists Develop a strategy in the career in information security Comprehend information security in the context of the mission of a business

© Pearson Education Information Security: Principles and Practices 4 Introduction To protect computers, networks, and the information they store, organizations are increasingly turning to information security specialists An information security specialist is more than a technician who prevents hackers from attacking a Web site

© Pearson Education Information Security: Principles and Practices 5 Introduction cont. We begin by trying to answer the first question most students starting out in the field ask: Why study information security? In this book, we’ll examine both practical and theoretical skills security specialists use to protect information systems

© Pearson Education Information Security: Principles and Practices 6 Growing IT Security Importance and New Career Opportunities Increased services to both end-users and employees create worlds of possibilities in satisfying customer needs, but … they also create risks to the confidentiality, integrity, and availability of confidential or sensitive data

© Pearson Education Information Security: Principles and Practices 7 Increasing Demand by Government and Private Industry  Higher demand for expertly trained individuals  U.S. Statistics The security of computer networks will continue to increase in importance as more business is conducted over the Internet Source:  Computer world expects security pay to continue to out perform the market Source: ory/0,10801,73893,00.html ory/0,10801,73893,00.html

© Pearson Education Information Security: Principles and Practices 8 Becoming an Information Security Specialist  Get the right certification Certified Information Systems Security Professional (CISSP) Global Information Assurance Certification (GIAC):  Consider earning a graduate degree in INFOSEC  Increase your disaster recovery and risk management skills  Build a home laboratory

© Pearson Education Information Security: Principles and Practices 9 Becoming an Information Security Specialist cont.  Get on a project working with strategic partners  Take a second look at government jobs

© Pearson Education Information Security: Principles and Practices 10 Schools Are Responding to Demands Hundreds of community colleges, four-year universities, and post-graduate programs are offering degrees and certificates in emergency preparedness, counterterrorism, and security  The National Security Agency Centers of Academic Excellence

© Pearson Education Information Security: Principles and Practices 11 Contextualizing Information Security Information security draws upon the best practices and experiences from multiple domains

Here are some key definitions Definitions Computer Security - generic name for the collection of tools designed to protect data and to thwart hackers Network Security - measures to protect data during their transmission Internet Security - measures to protect data during their transmission over a collection of interconnected networks

Remember: Aim of Course our focus is on Internet Security which consists of measures to prevent, detect, and correct security violations that involve the transmission & storage of information

Aspects of Security consider 3 aspects of information security:  security attack  security mechanism  security service Now we will define each aspect…

The OSI security architecture focuses on security attacks, mechanisms, and services. These can be defined briefly as follows: Security attack: Any action that compromises the security of information owned by an organization. Security mechanism: A process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack. Security service: A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization.  The services are intended to counter security attacks, and they make use of one or more security mechanisms to provide the service. © Pearson Education Information Security: Principles and Practices 15

Passive Attacks

Have “passive attacks” which attempt to learn or make use of information from the system but does not affect system resources. By eavesdropping on عن طريق التنصت على, or monitoring of, transmissions to:  + obtain message contents (as shown above in Stallings Figure 1.3a), or  + monitor traffic flows مراقبة تدفق حركة المرور Are difficult to detect because they do not involve any alteration of the data.

Active Attacks

Also have “active attacks” which attempt to alter system resources or affect their operation. By modification of data stream to: عن طريق تعديل تدفق البيانات إلى ما يلي :  + masquerade of one entity as some other تتنكر في كيان واحد مثل الاخرين  replay previous messages (as shown above in Stallings Figure 1.4b)  + modify messages in transit  + denial of service

Security Service  enhance security of data processing systems and information transfers of an organization  intended to counter security attacksتهدف للتصدي لهجمات أمنية  using one or more security mechanisms  often replicates functions normally associated with physical documentsغالبا ما يكرر المهام المرتبطة عادة الوثائق المادية which, for example, have signatures, dates; need protection from disclosure الكشف, tampering العبث, or destruction التدمير; be notarized مصدقة or witnessed; be recorded or licensed يتم تسجيلها أو ترخيصها

Consider the role of a security service, and what may be required. Note both similarities and differences with traditional paper documents, which for example: have signatures & dates; need protection from disclosure, tampering, or destruction; may be notarized or witnessed; may be recorded or licensed

Security Services Examples X.800: “a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or of data transfers” RFC 2828: “a processing or communication service provided by a system to give a specific kind of protection to system resources” Note: security services implement security policies and are implemented by security mechanisms.

Security Services Examples X.800: “a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or of data transfers” RFC 2828: “a processing or communication service provided by a system to give a specific kind of protection to system resources” Note: security services implement security policies and are implemented by security mechanisms.

© Pearson Education Information Security: Principles and Practices 24 Information Security Careers Meet the Needs of Business To support business operations a number of common positions and career opportunities are needed  Security administrators  Access coordinators  Security architects and network engineers  Security consultants  Security testers

© Pearson Education Information Security: Principles and Practices 25 Summary The risks posed to networked systems remain to attacks from within and without an organization

© Pearson Education Information Security: Principles and Practices 26 Summary cont. The explosive growth of e-commerce and business uses of the Internet have created a growing demand for INFOSEC specialists

© Pearson Education Information Security: Principles and Practices 27 Summary cont. The principles, approaches, and concepts in INFOSEC should work together to provide the harmonious mix of risk that modern business demands