Lecture 1

What is Information Security?

"A well-informed sense of assurance that the information risks and controls are in balance.” Jim Anderson, Inovant* (2002)

What does this mean?

Security professionals must review the origins of this field to understand its impact on our understanding of information security today - let's do this now

The 1960s, 70s and 80s – what was the communication model?

Communications – based on ‘circuit switched’ telephony:

communication performed by operators

History of information security - 1960s, 70s and 80s

alt text

Analogue to Digital

How long is the voltage kept high to signal a “1” in digital communication?

alt text

Package switching router

package-switching router network gear in riser
alt text alt text

each riser, a patch panel

Network fibre optics cable

Network devices

alt text

1990's to present time

need a lock on network equipment

Why did we look at computer network cables & devices?

need firewalls and intrusion detection system

Defining security

“The quality or state of being secure - to be free from danger”

A successful organization should have multiple layers of security in place:

  1. Physical: This involves securing the physical infrastructure and assets of an organization, such as buildings, servers, and other equipment, from theft, damage, and unauthorized access.
  2. Personnel: This includes implementing policies and procedures to ensure that employees and contractors are aware of their security responsibilities and are trained to respond to security incidents.
  3. Operations: This involves the day-to-day procedures and controls that are put in place to protect the organization’s data and IT infrastructure, such as regular system backups, patch management, and incident response.
  4. Communications: This layer focuses on securing all forms of communication (emails, phone calls, video conferences, etc.) to prevent eavesdropping, interception, or disruption.
  5. Network: This involves protecting the organization’s network infrastructure from threats such as malware, hacking, and denial-of- service attacks, often through the use of firewalls, intrusion detection systems, and secure network architectures.
  6. Information: This layer focuses on protecting the confidentiality, integrity, and availability of the organization’s data, both in transit and at rest, through measures such as encryption, access controls, and data loss prevention strategies.

How do we achieve information security?

Key information security concepts

alt text

threat agent - agent that applied a threat to your organisation

Information security characteristics (quality of service)

alt text

Non-repudiation

Authenticity

Confidentiality

Integrity

Availability

CNSS Security Model (U.S. Committee on National Security Systems - CNSS)

alt text

Three labels on the axes:

Controls:

Characteristics

alt text

examples of taking the framework and enforcing policies

Balancing information security and access

Security Professionals in the organisation

Information security implementation is initiated by upper management (top-down)

Chief information officer (CIO)

Chief information security officer (CISO)

alt text

Information security project team

alt text

Data Responsibilities

alt text

Data custodians are responsible for the information and the systems that process, transmit, and store it. Depending on the size of the organization, this may be a dedicated position, such as the CISO, or it may be an additional responsibility of a systems administrator or other technology manager. The duties of a data custodian often include overseeing data storage and backups, implementing the specific procedures and policies laid out in the security policies and plans