What is Information Systems Security?
How can you manage the risk of information systems?
Risk = Probability x Impact
Probability: f(threats, vulnerabilities)
Impact: f(assets)
Asset: anything that could be of value
Threat: Potential danger to information life cycle
Vulnerability: Weakness that provides an opportunity for a threat to be exploited
What countermeasures / safeguards are available to mitigate potential risks?
Is there a perfect security?
How can you determine Good Enough Security
What are the components of security
- Security mechanisms
Explain Security Services
A service that enhances the security of the information systems. Uses one or more security mechanisms CIA - Confidentiality - Integrity - Availability - Authentication
Explain Security mechanisms
Mechanism designed to prevent or recover from a security attack
What means confidentiality?
Ensuring that only authorized principals can read the information
Threat: Disclosure
Security Mechanism: Encryption
What is encryption?
A transformation of plain text to cypher text
Decryption is the reverse transformation into plain text
How does the Caesar encryption work?
Encryption + 3 letters shift in the alphabet
Decryption - 3 letters shift in the alphabet
Hallo -> KDOOR
How does a symmetric cryptography work in general?
Message Source P ->
Encryption Algorithm E -> C=E(K,P)
Decryption Algorithm D -> P=D(K,C)
C= Cypher Text P = Plain Text K = Key
Algorithms are public; security due to secrecy of the key, same key for encryption and decryption
What are potential methods to attack encrypted data?
Brute Force: Try all possible decryption key until finding the correct one
Cryptanalysis: Analyze information of the cryptosystem to reduce the space of possible decryption keys
Why do we need (public key) asymmetric cryptography
-> Public key (asymmetric) cryptography allows to exchange keys over an insecure channel
How does (public key) asymmetric cryptography work?
Two keys per user:
1) Encrypt plain text with receivers public key
2) Transmit cryphertext
3) Receiver decrypts the text using its private key to obtain plain text
Explain integrity
Ensures that only authorized principals can modify the information
Threat: Corruption
Mechanism: Hash, MAC code, digital signature
What is a hash?
How can attackers influence the hash?
Explain how message authentication code can create integrity
Message Authentication Code (MAC):
Explain how digital signature can create integrity
(Encryption with senders private key and decryption with senders public key)
Explain Availability
How can redundancy guarantee availability
How can load balancing guarantee availability
Explain Authentication