Presentation is loading. Please wait.

Presentation is loading. Please wait.

Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 1: Why Study Information Security?

Similar presentations


Presentation on theme: "Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 1: Why Study Information Security?"— Presentation transcript:

1 Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 1: Why Study Information Security?

2 Chapter 1 Chapter 1: Why Study Information Security? © Pearson Education Information Security: Principles and Practices 2

3 3 Objectives Recognize the growing importance of information security specialists Develop a strategy in the career in information security Comprehend information security in the context of the mission of a business

4 © Pearson Education Information Security: Principles and Practices 4 Introduction To protect computers, networks, and the information they store, organizations are increasingly turning to information security specialists An information security specialist is more than a technician who prevents hackers from attacking a Web site

5 © Pearson Education Information Security: Principles and Practices 5 Introduction cont. We begin by trying to answer the first question most students starting out in the field ask: Why study information security? In this book, we’ll examine both practical and theoretical skills security specialists use to protect information systems

6 © Pearson Education Information Security: Principles and Practices 6 Growing IT Security Importance and New Career Opportunities Increased services to both end-users and employees create worlds of possibilities in satisfying customer needs, but … they also create risks to the confidentiality, integrity, and availability of confidential or sensitive data

7 © Pearson Education Information Security: Principles and Practices 7 Increasing Demand by Government and Private Industry  Higher demand for expertly trained individuals  U.S. Statistics The security of computer networks will continue to increase in importance as more business is conducted over the Internet Source: www.collegegrad.com/careers/manage30.shtml www.collegegrad.com/careers/manage30.shtml  Computer world expects security pay to continue to out perform the market Source: www.computerworld.com/careertopics/careers/st ory/0,10801,73893,00.html www.computerworld.com/careertopics/careers/st ory/0,10801,73893,00.html

8 © Pearson Education Information Security: Principles and Practices 8 Becoming an Information Security Specialist  Get the right certification Certified Information Systems Security Professional (CISSP) Global Information Assurance Certification (GIAC):www.giac.orgwww.giac.org  Consider earning a graduate degree in INFOSEC  Increase your disaster recovery and risk management skills  Build a home laboratory

9 © Pearson Education Information Security: Principles and Practices 9 Becoming an Information Security Specialist cont.  Get on a project working with strategic partners  Take a second look at government jobs

10 © Pearson Education Information Security: Principles and Practices 10 Schools Are Responding to Demands Hundreds of community colleges, four-year universities, and post-graduate programs are offering degrees and certificates in emergency preparedness, counterterrorism, and security  The National Security Agency Centers of Academic Excellence www.nsa.gov/ia/academia/caeiae.cfm

11 © Pearson Education Information Security: Principles and Practices 11 Contextualizing Information Security Information security draws upon the best practices and experiences from multiple domains

12 Here are some key definitions Definitions Computer Security - generic name for the collection of tools designed to protect data and to thwart hackers Network Security - measures to protect data during their transmission Internet Security - measures to protect data during their transmission over a collection of interconnected networks

13 Remember: Aim of Course our focus is on Internet Security which consists of measures to prevent, detect, and correct security violations that involve the transmission & storage of information

14 Aspects of Security consider 3 aspects of information security:  security attack  security mechanism  security service Now we will define each aspect…

15 The OSI security architecture focuses on security attacks, mechanisms, and services. These can be defined briefly as follows: Security attack: Any action that compromises the security of information owned by an organization. Security mechanism: A process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack. Security service: A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization.  The services are intended to counter security attacks, and they make use of one or more security mechanisms to provide the service. © Pearson Education Information Security: Principles and Practices 15

16 Passive Attacks

17 Have “passive attacks” which attempt to learn or make use of information from the system but does not affect system resources. By eavesdropping on عن طريق التنصت على, or monitoring of, transmissions to:  + obtain message contents (as shown above in Stallings Figure 1.3a), or  + monitor traffic flows مراقبة تدفق حركة المرور Are difficult to detect because they do not involve any alteration of the data.

18 Active Attacks

19 Also have “active attacks” which attempt to alter system resources or affect their operation. By modification of data stream to: عن طريق تعديل تدفق البيانات إلى ما يلي :  + masquerade of one entity as some other تتنكر في كيان واحد مثل الاخرين  replay previous messages (as shown above in Stallings Figure 1.4b)  + modify messages in transit  + denial of service

20 Security Service  enhance security of data processing systems and information transfers of an organization  intended to counter security attacksتهدف للتصدي لهجمات أمنية  using one or more security mechanisms  often replicates functions normally associated with physical documentsغالبا ما يكرر المهام المرتبطة عادة الوثائق المادية which, for example, have signatures, dates; need protection from disclosure الكشف, tampering العبث, or destruction التدمير; be notarized مصدقة or witnessed; be recorded or licensed يتم تسجيلها أو ترخيصها

21 Consider the role of a security service, and what may be required. Note both similarities and differences with traditional paper documents, which for example: have signatures & dates; need protection from disclosure, tampering, or destruction; may be notarized or witnessed; may be recorded or licensed

22 Security Services Examples X.800: “a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or of data transfers” RFC 2828: “a processing or communication service provided by a system to give a specific kind of protection to system resources” Note: security services implement security policies and are implemented by security mechanisms.

23 Security Services Examples X.800: “a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or of data transfers” RFC 2828: “a processing or communication service provided by a system to give a specific kind of protection to system resources” Note: security services implement security policies and are implemented by security mechanisms.

24 © Pearson Education Information Security: Principles and Practices 24 Information Security Careers Meet the Needs of Business To support business operations a number of common positions and career opportunities are needed  Security administrators  Access coordinators  Security architects and network engineers  Security consultants  Security testers

25 © Pearson Education Information Security: Principles and Practices 25 Summary The risks posed to networked systems remain to attacks from within and without an organization

26 © Pearson Education Information Security: Principles and Practices 26 Summary cont. The explosive growth of e-commerce and business uses of the Internet have created a growing demand for INFOSEC specialists

27 © Pearson Education Information Security: Principles and Practices 27 Summary cont. The principles, approaches, and concepts in INFOSEC should work together to provide the harmonious mix of risk that modern business demands


Download ppt "Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 1: Why Study Information Security?"

Similar presentations


Ads by Google