Concepts of Security
Security as a management issue:
4 basica management activities called domains:
5 information systems controls that most directly pertain to systems reliability
Defense-in-depth
employ multiple layers of controls in order to avoid having a single point of failure PDC
Time-based model of security
employ a combination of detective and corrective controls that identify an information security incident early enough to prevent the loss or compromise of information.
Basic steps criminals use to attack an organizations Information system:
What happens during conducting reconnaissance
collecting information about the target. The objective is to learn as much as possible about the target and to identify potential vulnerabilities.
What happens during social engineering
use information obtained during reconnaissance to ‘trick’ an unsuspecting employee into granting them access - social engineering.
Preventive Controls
Detective Controls
Corrective Controls
Passwords are a type of
Authentication
Authentication
the process of verifying the identity of a person or device attempting to access the system. The objective is to ensure that only legitimate suers can access the system. ACCESS
Types of Authentication
Smart card id badges
Biometrics
Secure ID systems
Combine into multi-factor authentication
Multifactor Authentication
use of two or all 3 types of authentications in conjunction
Multimodal Authentication
using multiple credentials of the same type.
Authorization
the process of restricting access of authenticated users to specific portions of the system and limit what actions they are permitted to perform. Restrict users functions and views.
Access Control Matrix
how authorization controls are often implemented. When an employee attempts to access a particular information systems resource, the system performance a compatibility test that matches the user’s authentication credentials against the access control matrix to determine whether that employee should be allowed to access that resource and perform the requested action.
Security equation
P > D+C
Security
Access to the system and its data is controlled and restricted to legitimate users
Confidentiality
Sensitive organizational information is protected from unauthorized disclosure
Privacy
personal information about customers is collected, used, disclosed, and maintained only in compliance with internal policies and external regulatory requirements and is protected from unauthorized disclosure.
Processing Integrity
Data are processed accurately, completely, in a timely manner, and only with proper authorization.