The document discusses the history and concepts of information security. It describes how information security evolved from early computer security focused on physical access to now address risks across entire systems and networks. The document outlines the National Security Telecommunications and Information Systems Security Committee (NSTISSC) model for classifying information assets. It also explains the systems development life cycle (SDLC) process and security-focused SSDLC for implementing information security programs within an organization. Key roles in information security governance are also defined.
1 1 tohttps://github.com/syaifulahdan/
INFORMATIONSECURITY
Introduction to Information Security
The History of Information Security
What is Security
What is Information Security
NSTISSC Security Model
Component of an Information System
Securing Components
Balancing Information Security and Acces
Approaches Information Security Implementation
: Bootom-Up Approach
The Systems Development Life Cycle
Investigation
Analysis
Logical Design
Physical Design
Implementatioin
Maintenance and Change
SSDLC
Investigation
Analysys
Logical Design
Implementation
Maintenance and Change
Security Professional and the
Organization
Senior management
Information Security Project Team
Data Ownership
Communities of Interest
Key Terms
Summary
3 3 tohttps://github.com/syaifulahdan/
•Understand the definition of information security
• Comprehend the history of computer security
and how it evolved into information security
• Understand the key terms and concepts of
information security
• Outline the phases of the security systems
development life cycle
• Understand the roles of professionals involved in
information security within an organization
4.
4 4 tohttps://github.com/syaifulahdan/
•Information security: a “well-informed
sense of assurance that the information
risks and controls are in balance.” —Jim
Anderson, Inovant (2002)
5.
5 5 tohttps://github.com/syaifulahdan/
•Began immediately after the first mainframes
were developed
• Groups developing code-breaking computations
during World War II created the first modern
computers
• Physical controls to limit access to sensitive
military locations to authorized personnel
• Rudimentary in defending against physical theft,
espionage, and sabotage
6.
6 6 tohttps://github.com/syaifulahdan/
•Advanced Research Procurement Agency
(ARPA) began to examine feasibility of
redundant networked communications
• Larry Roberts developed ARPANET from its
inception
7.
7 7 tohttps://github.com/syaifulahdan/
•ARPANET grew in popularity as did its potential
for misuse
• Fundamental problems with ARPANET security
were identified
– No safety procedures for dial-up connections to
ARPANET
– Non-existent user identification and authorization
to system
• Late 1970s: microprocessor expanded
computing capabilities and security threats
8.
8 8 tohttps://github.com/syaifulahdan/
•Information security began with Rand Report R-
609 (paper that started the study of computer
security)
• Scope of computer security grew from physical
security to include:
– Safety of data
– Limiting unauthorized access to data
– Involvement of personnel from multiple levels of
an organization
9.
9 9 tohttps://github.com/syaifulahdan/
•Networks of computers became more common;
so too did the need to interconnect networks
• Internet became first manifestation of a global
network of networks
• In early Internet deployments, security was
treated as a low priority
10.
10 10 tohttps://github.com/syaifulahdan/
•The Internet brings millions of computer
networks into communication with each other—
many of them unsecured
• Ability to secure a computer’s data influenced
by the security of every computer to which it is
connected
11.
11 11 tohttps://github.com/syaifulahdan/
•“The quality or state of being secure—to be
free from danger”
• A successful organization should have multiple
layers of security in place:
– Physical security
– Personal security
– Operations security
– Communications security
– Network security
– Information security
12.
12 12 tohttps://github.com/syaifulahdan/
•The protection of information and its critical
elements, including systems and hardware that
use, store, and transmit that information
• Necessary tools: policy, awareness, training,
education, technology
• C.I.A. triangle was standard based on
confidentiality, integrity, and availability
• C.I.A. triangle now expanded into list of critical
characteristics of information
14 14 tohttps://github.com/syaifulahdan/
•The value of information comes from the
characteristics it possesses:
– Availability
– Accuracy
– Authenticity
– Confidentiality
– Integrity
– Utility
– Possession
16 16 tohttps://github.com/syaifulahdan/
•Information System (IS) is entire set of
software, hardware, data, people, procedures,
and networks necessary to use information as
a resource in the organization
17.
17 17 tohttps://github.com/syaifulahdan/
•Computer can be subject of an attack and/or
the object of an attack
– When the subject of an attack, computer is
used as an active tool to conduct attack
– When the object of an attack, computer is the
entity being attacked
19 19 tohttps://github.com/syaifulahdan/
•Impossible to obtain perfect security—it is a
process, not an absolute
• Security should be considered balance between
protection and availability
• To achieve balance, level of security must allow
reasonable access, yet protect against threats
21 21 tohttps://github.com/syaifulahdan/
•Grassroots effort: systems administrators
attempt to improve security of their systems
• Key advantage: technical expertise of individual
administrators
• Seldom works, as it lacks a number of critical
features:
– Participant support
– Organizational staying power
23 23 tohttps://github.com/syaifulahdan/
•Initiated by upper management
– Issue policy, procedures and processes
– Dictate goals and expected outcomes of project
– Determine accountability for each required
action
• The most successful also involve formal
development strategy referred to as systems
development life cycle
24.
24 24 tohttps://github.com/syaifulahdan/
•Systems development life cycle (SDLC) is methodology
and design for implementation of information security
within an organization
• Methodology is formal approach to problem-solving
based on structured sequence of procedures
• Using a methodology
– ensures a rigorous process
– avoids missing steps
• Goal is creating a comprehensive security
posture/program
• Traditional SDLC consists of six general phases
26 26 tohttps://github.com/syaifulahdan/
•What problem is the system being developed
to solve?
• Objectives, constraints and scope of project
are specified
• Preliminary cost-benefit analysis is developed
• At the end, feasibility analysis is performed to
assesses economic, technical, and behavioral
feasibilities of the process
27.
27 27 tohttps://github.com/syaifulahdan/
•Consists of assessments of the organization,
status of current systems, and capability to
support proposed systems
• Analysts determine what new system is
expected to do and how it will interact with
existing systems
• Ends with documentation of findings and
update of feasibility analysis
28.
28 28 tohttps://github.com/syaifulahdan/
•Main factor is business need; applications
capable of providing needed services are
selected
• Data support and structures capable of
providing the needed inputs are identified
• Technologies to implement physical solution
are determined
• Feasibility analysis performed at the end
29.
29 29 tohttps://github.com/syaifulahdan/
•Technologies to support the alternatives
identified and evaluated in the logical design
are selected
• Components evaluated on make-or-buy
decision
• Feasibility analysis performed; entire solution
presented to end-user representatives for
approval
30.
30 30 tohttps://github.com/syaifulahdan/
•Needed software created; components ordered,
received, assembled, and tested
• Users trained and documentation created
• Feasibility analysis prepared; users presented
with system for performance review and
acceptance test
31.
31 31 tohttps://github.com/syaifulahdan/
Maintenanceand Change
• Consists of tasks necessary to support and
modify system for remainder of its useful life
• Life cycle continues until the process begins
again from the investigation phase
• When current system can no longer support the
organization’s mission, a new project is
implemented
32.
32 32 tohttps://github.com/syaifulahdan/
•The same phases used in traditional SDLC
may be adapted to support specialized
implementation of an IS project
• Identification of specific threats and creating
controls to counter them
• SecSDLC is a coherent program rather than a
series of random, seemingly unconnected
actions
33.
33 33 tohttps://github.com/syaifulahdan/
•Identifies process, outcomes, goals, and
constraints of the project
• Begins with enterprise information security
policy
• Organizational feasibility analysis is performed
34.
34 34 tohttps://github.com/syaifulahdan/
•Documents from investigation phase are
studied
• Analyzes existing security policies or programs,
along with documented current threats and
associated controls
• Includes analysis of relevant legal issues that
could impact design of the security solution
• The risk management task begins
35.
35 35 tohttps://github.com/syaifulahdan/
•Creates and develops blueprints for information
security
• Incident response actions planned:
– Continuity planning
– Incident response
– Disaster recovery
• Feasibility analysis to determine whether
project should continue or be outsourced
36.
36 36 tohttps://github.com/syaifulahdan/
•Needed security technology is evaluated,
alternatives generated, and final design selected
• At end of phase, feasibility study determines
readiness of organization for project
37.
37 37 tohttps://github.com/syaifulahdan/
•Security solutions are acquired, tested,
implemented, and tested again
• Personnel issues evaluated; specific training
and education programs conducted
• Entire tested package is presented to
management for final approval
38.
38 38 tohttps://github.com/syaifulahdan/
•Perhaps the most important phase, given the
ever-changing threat environment
• Often, reparation and restoration of information
is a constant duel with an unseen adversary
• Information security profile of an organization
requires constant adaptation as new threats
emerge and old threats evolve
39.
39 39 tohttps://github.com/syaifulahdan/
•Wide range of professionals required to
support a diverse information security program
• Senior management is key component; also,
additional administrative support and technical
expertise required to implement details of IS
program
40.
40 40 tohttps://github.com/syaifulahdan/
•Chief Information Officer (CIO)
– Senior technology officer
– Primarily responsible for advising senior
executives on strategic planning
• Chief Information Security Officer (CISO)
– Primarily responsible for assessment,
management, and implementation of IS in the
organization
– Usually reports directly to the CIO
41.
41 41 tohttps://github.com/syaifulahdan/
•A number of individuals who are experienced in
one or more facets of technical and non-
technical areas:
– Champion
– Team leader
– Security policy developers
– Risk assessment specialists
– Security professionals
– Systems administrators
– End users
42.
42 42 tohttps://github.com/syaifulahdan/
•Data Owner: responsible for the security and
use of a particular set of information
• Data Custodian: responsible for storage,
maintenance, and protection of information
• Data Users: end users who work with
information to perform their daily jobs
supporting the mission of the organization
43.
43 43 tohttps://github.com/syaifulahdan/
•Group of individuals united by similar
interest/values in an organization
– Information Security Management and
Professionals
– Information Technology Management and
Professionals
– Organizational Management and Professionals
45 45 tohttps://github.com/syaifulahdan/
•Information security is a “well-informed sense
of assurance that the information risks and
controls are in balance.”
• Computer security began immediately after first
mainframes were developed
• Successful organizations have multiple layers
of security in place: physical, personal,
operations, communications, network, and
information.
46.
46 46 tohttps://github.com/syaifulahdan/
•Security should be considered a balance
between protection and availability
• Information security must be managed
similar to any major system implemented
in an organization using a methodology
like SecSDLC