Page 38 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 38

Information  Security and Privacy




                    Notes          4.  ....................... is a key to the success of all operations.
                                   5.  An information ....................... often  indicates that security measures were not properly
                                       implemented.

                                   3.2 Basic Principles of Information Security


                                   The major technical areas of information security are usually represented by the initials CIA:
                                   confidentiality, integrity,  and  authentication  or  availability.  Confidentiality  means  that
                                   information cannot be access by unauthorized parties.
                                   Maintaining access control means not only that users can access only those resources and services
                                   to which they are entitled, but also that they are not denied resources that they legitimately can
                                   expect to access. Non-repudiation implies that a person who sends a message cannot deny that
                                   he sent it and,  conversely, that a person  who has  received a  message cannot  deny that  he
                                   received it. In addition to these technical aspects, the conceptual reach of information security is
                                   broad and multifaceted.

                                   While  confidentiality, integrity,  and  authenticity are the most  important  concerns of  an
                                   information security manager, privacy is perhaps the most important aspect of information
                                   security for everyday Internet users. Although users may feel that they have nothing to
                                   hide when they are registering with an Internet site or service, privacy on the Internet is
                                   about  protecting  one’s  personal  information,  even  if  the  information  does  not  seem
                                   sensitive.

                                   3.2.1 Secrecy

                                   Information security, in many ways, is about secrecy, not in the sense of being mysterious or
                                   clandestine,  but because  of the  fact  that  you are  always  dealing  with  authorization  and
                                   Authenticity.

                                   Information security touches draws from disciplines as ethics and risk analysis.


                                          Example: It is concerned with topics such as computer crime; the prevention, detection,
                                   and remediation of attacks; and identity and anonymity in cyberspace.

                                   3.2.2 Authenticity

                                   Authentication means that users are who they claim to be. Availability means that resources are
                                   accessible by authorized parties; “denial of service” attacks, which are sometimes the topic of
                                   national news, are attacks against availability. Other important concerns of information security
                                   professionals are access control and Non-repudiation.
                                   Authorization  refers  to  the  power  you  have  over  distinguishing  authorized  users
                                   from unauthorized users, and levels of access in-between. Authenticity refers to the constant
                                   checks you have to run on the system to make sure sensitive areas are protected and working
                                   properly.

                                   3.2.3 Confidentiality

                                   Confidentiality is also known as secrecy or privacy; breaches of confidentiality range from the
                                   embarrassing to the disastrous. Confidentiality is discussed in detail in next section.






          32                                LOVELY PROFESSIONAL UNIVERSITY
   33   34   35   36   37   38   39   40   41   42   43