Unit 1: Overview of Information Security

  • What is Information and why should we protect it?
  • Information Security
  • Threats – Frauds, Thefts, Malicious Hackers, Malicious Code, Denial-of-Services Attacks and Social Engineering
  • Vulnerability – Types
  • Risk – an introduction
  • Business Requirements
  • Information Security Definitions
  • Security Policies
    • Tier1 (Origination-Level)
    • Tier2 (Function Level)
    • Tier3 (Application/Device Level)
  • Procedures
  • Standards
  • Guidelines

  • What is Information, and Why Should We Protect It?
    • Information: Data that is meaningful and valuable to an individual or organization.
    • Protection Reasons:
      • Confidentiality: Preventing unauthorized access.
      • Integrity: Ensuring data accuracy and reliability.
      • Availability: Ensuring data is accessible when needed.
      • Compliance: Meeting legal and regulatory requirements.
  • Information Security:
    • Definition: Measures to protect information from unauthorized access, disclosure, alteration, and destruction.
    • Components: People, processes, and technology working together to secure information.
  • Threats – Frauds, Thefts, Malicious Hackers, Malicious Code, Denial-of-Services Attacks, and Social Engineering:
    • Frauds: Deceptive practices for financial gain.
    • Thefts: Unauthorized taking of information or physical assets.
    • Malicious Hackers: Individuals exploiting vulnerabilities for malicious purposes.
    • Malicious Code: Software designed to harm or exploit systems.
    • Denial-of-Service Attacks: Overwhelming a system to disrupt services.
    • Social Engineering: Manipulating individuals to gain unauthorized access.
  • Vulnerability – Types:
    • Software Vulnerabilities: Flaws in software code.
    • Hardware Vulnerabilities: Weaknesses in hardware components.
    • Human Vulnerabilities: Weaknesses in human behaviour.
  • Risk – An Introduction:
    • Risk: The potential for loss or harm to assets.
    • Risk Management: Identifying, assessing, and mitigating risks.
    • Risk Components: Threats, vulnerabilities, and impact.
  • Business Requirements:
    • Alignment: Ensuring information security supports business objectives.
    • Legal Compliance: Adhering to laws and regulations.
    • Operational Continuity: Maintaining uninterrupted business operations.
  • Information Security Definitions:
    • Confidentiality: Ensuring data is only accessed by authorized individuals.
    • Integrity: Safeguarding data from unauthorized modification.
    • Availability: Ensuring timely and reliable access to information.
  • Security Policies:
    • Definition: Formalized rules and guidelines for information security.
    • Purpose: Establishing expectations and standards for security.
  • Tier 1 (Origination-Level), Tier 2 (Function Level), Tier 3 (Application/Device Level):
    • Tier 1: Organization-wide policies and strategies.
    • Tier 2: Policies specific to functional areas or departments.
    • Tier 3: Policies tailored to individual applications or devices.
  • Procedures:
    • Definition: Step-by-step instructions for implementing security policies.
    • Purpose: Ensuring consistency and adherence to security protocols.
  • Standards:
    • Definition: Detailed technical specifications and requirements.
    • Role: Guiding the implementation and configuration of security measures.
  • Guidelines:
    • Definition: Recommended practices and suggestions.
    • Flexibility: Providing general advice for adapting to specific situations.

Unit 2: Information Asset Classification

  • Why should we classify information?
  • Information Asset – Owner, Custodian, User
  • Information Classification – Secret, Confidential, Private and Public
  • Methodology
  • Declassification or Reclassification
  • Retention and Disposal of Information Assets
  • Provide Authorization for Access – Owner, Custodian, User

  • Why Should We Classify Information?
    • Protection: Safeguarding sensitive information from unauthorized access.
    • Prioritization: Allocating resources based on the importance of information.
    • Compliance: Meeting regulatory requirements for data protection.
    • Risk Management: Identifying and addressing potential vulnerabilities.
  • Information Asset – Owner, Custodian, User:
    • Owner: The individual responsible for the information and its classification.
    • Custodian: Person or system managing and safeguarding the information.
    • User: Individuals with authorized access to classified information.
  • Information Classification – Secret, Confidential, Private, and Public:
    • Secret: Highly sensitive information, access restricted to a select few.
    • Confidential: Restricted access to authorized personnel.
    • Private: Information for internal use, not for public disclosure.
    • Public: Information intended for public knowledge and dissemination.
  • Methodology:
    • Identification: Recognizing and labelling information according to its sensitivity.
    • Categorization: Assigning specific classifications based on predefined criteria.
    • Labeling: Indicating the classification of documents or data.
  • Declassification or Reclassification:
    • Declassification: Process of reducing the sensitivity of information over time.
    • Reclassification: Changing the classification of information due to changes in its importance or sensitivity.
  • Retention and Disposal of Information Assets:
    • Retention Policies: Guidelines for how long information should be kept.
    • Secure Disposal: Safely disposing of information at the end of its lifecycle.
    • Data Destruction: Physical or digital methods to make information unrecoverable.
  • Provide Authorization for Access – Owner, Custodian, User:
    • Owner Authorization: Granting access based on the information’s sensitivity.
    • Custodian Role: Managing and controlling access permissions.
    • User Access: Adhering to the authorized level of access granted.

Unit 3: Risk Analysis & Risk Management

  • Risk Analysis Process
  • Asset Definition
  • Threat Identification
  • Determine Probability of Occurrence
  • Determine the Impact of the Threat
  • Controls Recommended
  • Risk Mitigation
  • Control Types/Categories
  • Cost/Benefit Analysis

  • Risk Analysis Process:
    • Definition: Systematic evaluation of potential threats and vulnerabilities.
    • Objective: Identify, assess, and prioritize risks to an organization’s assets.
  • Asset Definition:
    • Assets: Tangible and intangible items critical to an organization.
    • Identification: Define and categorize assets based on their value and importance.
    • Examples: Data, hardware, software, and intellectual property.
  • Threat Identification:
    • Threats: Potential events or circumstances that can harm assets.
    • Identification: Recognizing and documenting various types of threats.
    • Sources: Natural disasters, human error, malicious attacks.
  • Determine Probability of Occurrence:
    • Probability Assessment: Estimating the likelihood of threats occurring.
    • Factors: Historical data, expert judgment, environmental conditions.
  • Determine the Impact of the Threat:
    • Impact Assessment: Evaluating the potential harm or consequences of a threat.
    • Criteria: Financial loss, operational disruption, reputation damage.
  • Controls Recommended:
    • Risk Controls: Strategies to reduce or eliminate risks.
    • Preventive Controls: Measures to stop or minimize the likelihood of a threat.
    • Detective Controls: Measures to identify and respond to a threat.
  • Risk Mitigation:
    • Mitigation Strategies: Actions taken to reduce the impact or likelihood of risks.
    • Risk Transfer: Shifting risk to third parties, like insurance.
    • Risk Acceptance: Acknowledging and consciously accepting certain risks.
  • Control Types/Categories:
    • Technical Controls: Implementing security technologies.
    • Administrative Controls: Policies, procedures, and training.
    • Physical Controls: Securing the physical environment.
  • Cost/Benefit Analysis:
    • Analysis: Evaluating the financial costs versus the benefits of risk controls.
    • Decision-Making: Assessing whether the cost of controls justifies the potential risk reduction.
    • Optimization: Balancing security measures with financial constraints.

Unit 4: Access Control

  • User Identity and Access Management
  • Account Authorization
  • Access and Privilege Management
  • System and Network Access Control
  • Operating Systems Access Controls
  • Monitoring Systems Access Controls
  • Intrusion Detection System
  • Event Logging
  • Cryptography

  • User Identity and Access Management:
    • User Identity Management: Creating, managing, and securing user identities.
    • Access Management: Controlling user access to resources and data.
    • Authentication Methods: Passwords, biometrics, multi-factor authentication.
  • Account Authorization:
    • Authorization Policies: Defining what actions users are allowed to perform.
    • Role-Based Access Control (RBAC): Assigning permissions based on job roles.
    • Least Privilege Principle: Providing the minimum level of access necessary for tasks.
  • Access and Privilege Management:
    • Access Management: Granting, modifying, or revoking user access.
    • Privilege Management: Controlling elevated permissions for specific tasks.
    • Access Reviews: Regular assessments of user access to ensure compliance.
  • System and Network Access Control:
    • System Access Control: Policies and mechanisms to restrict system access.
    • Network Access Control (NAC): Regulating access to a network based on user and device attributes.
    • Endpoint Security: Ensuring security on devices connecting to the network.
  • Operating Systems Access Controls:
    • File and Folder Permissions: Controlling access to files and directories.
    • User Account Controls (UAC): Managing privileges on Windows systems.
    • Security Policies: Defining rules for user behaviour and access.
  • Monitoring Systems Access Controls:
    • Access Monitoring: Continuous tracking of user activities and access.
    • Auditing: Reviewing logs and reports to identify unauthorized activities.
    • Alerts and Notifications: Instant notifications for suspicious access patterns.
  • Intrusion Detection System:
    • Function: Detecting and responding to unauthorized access or malicious activities.
    • Types: Network-based IDS, Host-based IDS.
    • Real-time Monitoring: Analyzing network traffic and system logs for anomalies.
  • Event Logging:
    • Logging Events: Recording security events, user actions, and system activities.
    • Log Analysis: Reviewing logs for security incidents and compliance.
    • Retention Policies: Defining how long logs are retained for auditing and investigation.
  • Cryptography:
    • Encryption: Protecting data by converting it into a secure format.
    • Decryption: Reverting encrypted data to its original form.
    • Key Management: Safeguarding cryptographic keys for secure communication.
    • Digital Signatures: Verifying the authenticity and integrity of digital messages.

Unit 5: Physical Security

  • Identify Assets to be Protected
  • Perimeter Security
  • Fire Prevention and Detection
  • Safe Disposal of Physical Assets

  • Identify Assets to be Protected:
    • Assets: Tangible and intangible items of value to the organization.
    • Identification: Listing and categorizing assets for protection.
    • Importance: Forms the basis for developing a comprehensive security strategy.
  • Perimeter Security:
    • Definition: Securing the physical boundaries of an organization.
    • Components: Fences, gates, access control systems.
    • Purpose: Preventing unauthorized access and protecting sensitive areas.
  • Fire Prevention and Detection:
    • Prevention Measures: Fire-resistant materials, proper wiring, safe storage.
    • Detection Systems: Smoke detectors, heat sensors, fire alarms.
    • Importance: Minimizing the risk of fire-related damage and loss.
  • Safe Disposal of Physical Assets:
    • Definition: Proper disposal of assets at the end of their lifecycle.
    • Methods: Secure data wiping, and physical destruction.
    • Importance: Avoiding data breaches and preventing unauthorized use of discarded assets.

 


Leave a Reply