Lecture 1 - Introduction to Information Security Flashcards
?
Earlier versions of the German code machine ? were first broken by the Poles in the 1930s.
The History of Information Security
Enigma
?
The British and Americans managed to break later, more complex versions during World War II.
The History of Information Security
Enigma
?
The increasingly complex versions of the ?, especially the submarine version of the ?, caused considerable anguish to Allied forces before finally being cracked.
The History of Information Security
Enigma
The Enigma
Earlier versions of the German code machine Enigma were first broken by the Poles in the ?.
Hint: 19xxs
The History of Information Security
1930s
?
During the Cold War, many more mainframes were brought online to accomplish more complex and sophisticated tasks.
Hint: 19xxs
The History of Information Security
1960s
?
During the next decade, ARPANET became popular and more widely used, and the potential for its misuse grew.
Hint: 19xxs and 19xxs
The History of Information Security
1970s and 80s
1968
Maurice Wilkes discusses password security in ?.
Hint: ? Computer Systems
The History of Information Security
Time-Sharing Computer Systems
1973
Schell, Downey, and Popek examine the need for additional security in military systems in “Preliminary Notes on the Design of ?”.
Hint: ? Computer Systems
The History of Information Security
Secure Military Computer Systems
1975
The Federal Information Processing Standards (FIPS) examines Digital Encryption Standard (DES) in the ?.
The History of Information Security
Federal Register
1978
Bisbey and Hollingworth publish their study “?: Final Report”, discussing the ? project created by ARPA to better understand the vulnerabilities detection techniques in existing system software.
The History of Information Security
Protection Analysis
1979
Morris and Thompson author “?: A Case History” published in the Communications of the Association for Computing Machinery (ACM). This paper examines the history of a design for a ? scheme on a remotely accessed, time-sharing system.
The History of Information Security
Password Security
1979
Dennis Ritchie publishes “On the Security of UNIX” and “Protection of Data File Contents” discussing secure user IDs and secure group IDs, and the problems inherent in the systems.
The History of Information Security
1984
Grampp and Morris write ”?”. In this report, the authors examine four “important handles to computer security”: (1) physical control of premises and computer facilities, (2) management commitment to security objectives, (3) education of employees, and (4) administrative procedures aimed at increased security.
Hint: ? OS ?
The History of Information Security
UNIX Operating System Security
1984
Reeds and Weinberger publish ”?”. Their premise was: “No technique can be secure against wiretapping or its equivalent on the computer. Therefore no technique can be secure against the systems administrator or other priviledged users … the naive user has no chance.”
Hint: ? ? and the UNIX ? ? ?
The History of Information Security
File Security and the UNIX System Crypt Command
?
At the close of the twentieth century, networks of computers became more common, as did the need to connect these networks to each other. professionals.
Hint: 19xxs
The History of Information Security
1990s
?
Today, the Internet brings millions of unsecured computer networks into continuous communication with each other. The security of each computer’s stored information is now contingent on the level of security of every other computer to which it is connected.
Hint: 2XXX ? ?
The History of Information Security
2000 to Present
In general, ? is “the quality or state of being secure— to be free from danger.” In other words, protection against adversaries— from those who would do harm, intentionally or otherwise— is the objective.
What is Security?
Security
6 Layers of Security (to protect organization operations)
A successful organization should have the following multiple layers of security in place to protect its operations: ?, ??, ???, ????, ?????, and ??????.
What is Security?
- Physical security
- Personnel security
- Operations security
- Communications security
- Network security
- Information security
?
?, to protect physical items, objects, or areas from unauthorized access and misuse.
6 Layers of Security (to protect organization operations)
Physical security
?
?, to protect the individual or group of individuals who are authorized to access the organization and its operations
6 Layers of Security (to protect organization operations)
Personnel security
?
?, to protect the details of a particular operation or series of activities.
6 Layers of Security (to protect organization operations)
Operations security
?
?, to protect communications media, technology, and content
6 Layers of Security (to protect organization operations)
Communications security
?
?, to protect networking components, connections, and contents
6 Layers of Security (to protect organization operations)
Network security
?
?, to protect the confidentiality, integrity and availability
of information assets, whether in storage, processing, or transmission.
6 Layers of Security (to protect organization operations)
Information security
4 Components of Information Security
Components of Information Security: ?, ??, ???, and ???.
- Management of information security
- Network security
- Computer & data security
- Policy
13 Key Information Security Concepts
Key Information Security Concepts: ?, ??, ???, ????, ?????, ??????, ???????, ????????, ?????????, ??????????, ???????????, ????????????, and ?????????????.
- Access
- Asset
- Attack
- Control, safeguard, or countermeasure
- Exploit
- Exposure
- Loss
- Protection profile or security posture
- Risk
- Subjects and objects
- Threat
- Threat agent
- Vulnerability
?
A subject or object’s ability to use, manipulate, modify, or affect another subject or object.
13 Key Information Security Concepts
Access
?
The organizational resource that is being protected.
An asset can be:
* logical, such as a Web site, information, or data; or
* physical, such as a person, computer system, or other tangible object.
13 Key Information Security Concepts
Asset
Asset
An asset can be ?, such as a Web site, information, or data; or an asset can be ??, such as a person, computer system, or other tangible object.
13 Key Information Security Concepts
- logical
- physical
?
An intentional or unintentional act that can cause damage to or otherwise compromise information and/or the systems that support it.
13 Key Information Security Concepts
Attack
?
Security mechanisms, policies, or procedures that can successfully counter attacks, reduce risk, resolve vulnerabilities, and otherwise improve the security within an organization.
13 Key Information Security Concepts
Control, safeguard, or countermeasure