What is information security?
is the protection of information assets.
* Specifically, organizations want to make sure that their information is:
– Available only to authorized personnel. (Confidentiality)
– Free from unauthorized alterations (integrity)
– Available when needed. (Availability)
* Anything that negatively impacts on these desired characteristics is viewed as a Threat.
Reasons systems Are Vulnerable?
– The Internet
– Malicious software
– Hackers and Cyber vandalism
– Computer Crime
– Cyber terrorism and Cyber warfare
– Employees
– Natural Disasters
– Software Vulnerabilities
Why Systems Are Vulnerable? The Internet
These days you can sit in the comfort of your home and hack into the banks computers.
* The Internet is a huge network of networks with no central authority. Anyone can connect anonymously from almost anywhere in the world.
* Launching physically remote attacks is much less risky for the attacker.
* Security was not a design goal during early ARPANET discussions. The ARPANET was primarily a networking experiment.
* The designers assumed that security would handled elsewhere and never foresaw that the ARPANET would grow to what it is today.
Why Systems Are Vulnerable? Hackers and Cyber vandals
A hacker or cracker
is an individual who tries to gain unauthorized access to a computer system.
Why Systems Are Vulnerable? Computer Crime
Why Systems Are Vulnerable? Cyberwar and Cyber terrorism
Why Systems Are Vulnerable? Malicious software
Why Systems Are Vulnerable? Employees
Why Systems Are Vulnerable Natural Causes
Why Systems Are Vulnerable Software Vulnerabilities
The Business Value of Security
Many organizations are now so dependent on their information processing infrastructure that a loss of function is regarded as a business disaster.
* Companies can loose millions of dollars a day if their systems fail to function. The market value of eBay shares temporarily declined by several BILLION dollars after their servers crashed several times in quick succession back in 1998/1999.
* While hardware and software can be replaced, data, if not backed up, is gone forever. Several companies have gone out of business after a security incident simply because they could not recover their operational data.
The Business Value of Security pt 2
The Business Value of Security * The US legislation that impacts on security standards include:
– The Health Insurance Portability and Accountability Act (HIPAA)
– The Financial Services Modernization Act (GrammLeach-Bliley Act)
– The Public Company Accounting Reform and Investor Protection Act (Sarbanes-Oxley)
The Business Value of Security * The TT legislation that impacts on security standards include:
– The Computer Misuse Act of 2001
– Electronic Transfer of Funds Crime Act (2000)
– The Electronic Transactions Act (2011) (Awaiting Proclamation)
– The Data Protection Act of 2011 (Awaiting Proclamation)
Information Security Policy
Risk analysis
There are several technology tools available to protect information assets. These include:
– Access Control Systems
– Firewalls
– Intrusion Detection Systems
– Anti Virus Software
– Public Key Encryption
– Backup
Security Technologies Access Control-authorization
Security Technologies Access Control-biometrics
Security Technologies Firewalls
Security Technologies Intrusion Detection Systems
Security Technologies Anti Virus Systems
Security Technologies Public Key Encryption