2 Module 1 (Full) 12 05 2023
2 Module 1 (Full) 12 05 2023
2 Module 1 (Full) 12 05 2023
Information Security
MODULE - 1
• Confidentiality, integrity and availability.
• Security Assurance
For example:
• If an email with a digital signature was sent
or received, the integrity will be maintained
for these kinds of online transactions that
happen.
Availability
• Systems, applications, and data will lose their value if
they are not accessible by their authorized users
whenever they require them.
• Availability is the accessibility of networks, systems,
applications, and data by authorized users in a timely
fashion whenever resources are required.
➢ Password attacks
Security Threats
What is Malware Attack?
Attackers use many methods to get
malware into a user’s device, most often social
engineering.
Users may be asked to take an action, such
as clicking a link or opening an attachment.
In other cases, malware uses vulnerabilities
in browsers or operating systems to install
themselves without the user’s knowledge or
consent.
Security Threats
✓Ransomware
✓Wiper malware
✓Worms
✓Spyware
✓Fileless malware
(3) Malvertising —
online advertising controlled by hackers,
which contains malicious code that infects a
user’s computer when they click, or even just
view the ad.
Malvertising has been found on many
leading online publications.
Security Threats - Social engineering attacks
(4) Drive-by downloads —
Attackers can hack websites and insert malicious
scripts into PHP or HTTP code on a page.
When users visit the page, Malware is directly
installed on their computer; or, The attacker’s script redirects
users to a malicious site, which performs the download.
Drive-by downloads rely on vulnerabilities in browsers
or operating systems.
Specification –
• A major part of the derivation of specifications
is determination of the set of requirements
relevant to the system’s planned use
Security Assurance
Design:
• The design of a system translates the
specifications into components that will
implement them.
1) Cost-Benefit Analysis
2) Risk Analysis