Group 4 Presentation Information Security
Group 4 Presentation Information Security
Group 4 Presentation Information Security
INFORMATION SECURITY
GROUP 4
WHAT IS INFORMATION SECURITY?
INTEGRITY
THE ASSURANCE THAT THE INFORMATION BEING ACCESSED HAS NOT BEEN
ALTERED AND TRULY REPRESENTS WHAT IS INTENDED.
AVAILABILITY
INFORMATION CAN BE ACCESSED AND MODIFIED BY ANYONE AUTHORIZED TO DO
SO IN AN APPROPRIATE TIME FRAME.
INFORMATION SECURITY PRINCIPLES
NEED-TO-KNOW
PERSON SHOULD HAVE ABILITY TO ACCESS DATA SUFFICIENT TO PEFORM JOB AND NO MORE
LEAST PRIVILEGE
PERSON SHOULD HAVE ABILITY TO DO TASKS SUFFICIENT TO PERFORM PRIMARY JOBS OR NO MORE
SEGREGATION OF DUTIES
ENSURES NO PERSON CAN ASSUME TWO ROLES: ORIGINATION, AUTHORIZATION,
DISTRIBUTION AND VERIFICATION
COMMON INFORMATION SECURITY RISKS
• FIREWALLS
• SECURITY INCIDENT AND EVENT
MANAGEMENT (SIEM)
• DATA LOSS PREVENTION (DLP)
• INTRUSION DETECTION SYSTEM (IPS)
• USER BEHAVIORAL ANALYTICS (UBA)
• BLOCKCHAIN CYBERSECURITY
• ENDPOINT DETECTION AND RESPONSE
(EDR)
• CLOUD SECURITY POSTURE MANAGEMENT
(CSPM)
TYPES OF INFORMATION SECURITY
• APPLICATION SECURITY
• INFRASTRUCTURE SECURITY
• CLOUD SECURITY
• CRYPTOGRAPHY
• INCIDENT RESPONSE
• VULNERABILITY MANAGEMENT
• DISASTER RECOVERY
1) APPLICATION
SECURITY
1. PASSWORD-BASED AUTHENTICATION
2. MULTI-FACTOR AUTHENTICATION
3. CERTIFICATE-BASED
AUTHENTICATION
4. BIOMETRIC AUTHENTICATION
5. TOKEN-BASED AUTHENTICATION
1) PASSWORD-BASED
AUTHENTICATION
• DIGITAL CERTIFICATES PROVE THE OWNERSHIP OF A PUBLIC KEY AND ISSUED ONLY
BY A CERTIFICATION AUTHORITY.
4) BIOMETRIC AUTHENTICATION
• CONFIDENTIALITY
• INTRUSION DETECTION AND PREVENTION
• RESTRICT UNAUTHORISED ACCESS
• ELIMINATE KEY CONCERNS:
• PREVENT DATA INTERCEPTION:
• CONTROL DATA OWNERSHIP & DUPLICATES
COMPONETS OF ACCESS CONTROL
TYPES OF ACCESS CONTROL
• IT DESCRIBES THE PROCESS OF CREATING AND STORING COPIES OF DATA THAT CAN BE USED TO
PROTECT ORGANIZATIONS AGAINST DATA LOSS.
• RECOVERY FROM A BACKUP TYPICALLY INVOLVES RESTORING THE DATA TO THE ORIGINAL LOCATION,
OR TO AN ALTERNATE LOCATION WHERE IT CAN BE USED IN PLACE OF THE LOST OR DAMAGED DATA.
• A PROPER BACKUP COPY IS STORED IN A SEPARATE SYSTEM OR MEDIUM, SUCH AS TAPE, FROM THE
PRIMARY DATA TO PROTECT AGAINST THE POSSIBILITY OF DATA LOSS DUE TO PRIMARY HARDWARE OR
SOFTWARE FAILURE.
IMPORTANCE OF BACKUP AND RECOVERY