The Need For Info Assurance and Security
The Need For Info Assurance and Security
The Need For Info Assurance and Security
Introduction
Learning Objective:
1. Site a scenario/s of Cyber attacks and specify what type of attack is being used:
Presentation of Content
What is Security?
-“The quality or state of being secure—to be free from danger”
- The protection of information and its critical elements, including systems and
hardware that use, store, and transmit that information
As stated in the IAS-1, the CIA Triad is a well-known model for security policy
development and a standard based for confidentiality, Integrity and Availability and been
considered the industry standard for computer security since the development of the
mainframe and now expanded into a list of critical characteristics of information.
Key Terms
Since we have mentioned the CIA Triad in our early discussions, Information
Assurance and Security: Confidentiality, Integrity and Availability is represented by
McCumber cube under Committee on National Security Systems (CNSS) Model.
The cube brings together desired goals (confidentiality, integrity, and availability),
information states (storage, transmission, and processing), and safeguards (policies and
practices, human factors, and technology). Below is a representation of the CNSS
Security Model:
Other Malware…
Trojan Horse
o Hide their true nature
o Reveal the designed behavior only when activated
Back door or trap door
o Allows access to system at will with special privileges
Polymorphism
o Changes it apparent shape over time
o Makes it undetectable by techniques that look for preconfigured signatures
INFORMATION ASSURANCE AND SECURITY 2
Unit 1: I. The need for Information Assurance and Security
Hoaxes
Intelligence Gathering
o Legal – competitive intelligence
o Illegal – industrial espionage
o Thin line
o One technique – shoulder surfing
Trespass
o Protect with
Authentication
Authorization
Hackers
2 levels
o Experts
Develop software scripts
Develop program exploits
o Novice
Script kiddie
Use previously written software
Packet monkeys
Use automated exploits
Forces of Nature
• Pose some of most dangerous threats
• Unexpected and occur with little or no warning
Examples:
Fire
Tornado
Tsunami
Electrostatic discharge
Dust contamination
Flood
Earthquake
INFORMATION ASSURANCE AND SECURITY 2
Unit 1: I. The need for Information Assurance and Security
Lightning
Landslide
Mudslide
Hurricane/typhoon
Prevention
o Training
o Ongoing awareness activities
o Controls
Require user to type a critical command twice
Verification of commands
Deliberate Acts
Information Extortion
o Attacker or trusted insider steals information
o Demands compensation
o Agree not to disclose information
Missing, Inadequate or Incomplete Controls
controls are:
o Missing
o Misconfigured
o Antiquated
o Poorly designed or managed
Make org more likely to suffer loss
INFORMATION ASSURANCE AND SECURITY 2
Unit 1: I. The need for Information Assurance and Security
Sabotage or Vandalism
Theft
Illegal taking of another’s property
o Physical
o Electronic
o Intellectual
o Constant
Problem – crime not always readily apparent
Technology Obsolescence
Outdated hardware or software
Reliability problems
Management problem
o Should have plan in place
Non-support of legacy systems
Can be costly to resolve
INFORMATION ASSURANCE AND SECURITY 2
Unit 1: I. The need for Information Assurance and Security
It is also been discussed in the previous lesson that cyberattack is an assault launched
by cybercriminals using one or more computers against a single or multiple computers or
networks. A cyberattack can maliciously disable computers, steal data, or use a
breached computer as a launch point for other attacks.
Examples of attacks with its corresponding definitions are the following:
Vector Definition
IP scan and attack Infected system scans IP addresses and
targets vulnerabilities
Web browsing Infects web content files infectious
Methods of Attack
SYN-ACK
ACK
(Establish connection)
IP-Spoofing
o IP address of the source element of the data packets are altered and
replaced with bogus addresses
o
SYN spoofing
o The server is overwhelmed by spoofed packets
o
Scanning
o Way of determining which ports are open and can be used
INFORMATION ASSURANCE AND SECURITY 2
Unit 1: I. The need for Information Assurance and Security
Denial of service
o Smurf send large amount of spoofed ping packets
o Overwhelms the system
o Can stop response
Spam
Mail bombing
Sniffing
o Monitors data traveling over a network
o legitimated and non-legitimate purposes
o Packet sniffing
Formative Assessment
Answer briefly but substantially the following questions:
2. You are using an Information Management System of your company, how will you
keep the confidentiality and security of the files? Explain.
3. Your boss noticed that there are suspicious activities in the system were the
company is using, what possible solutions would you recommend in order to
solve the problem?