As of January 2008, the internet connected an estimated 541.7 million computers in more
than 250 countries on every continent, even Antarctica (Source: Internet Software
Consortium’s Internet Domain Survey; www.isc.org/index.pl). The internet is not a
single network, but a worldwide collection of loosely connected networks that are
accessible by individual computer hosts, in a variety of ways, to anyone with a computer
and a network connection. Thus, individuals and organizations can reach any point on the
internet without regard to national or geographic boundaries or time of day.
However, along with the convenience and easy access to information come risks. Among
them are the risks that valuable information will be lost, stolen, changed, or misused. If
information is recorded electronically and is available on networked computers, it is
more vulnerable than if the same information is printed on paper and locked in a file
cabinet. Intruders do not need to enter an office or home; they may not even be in the
same country. They can steal or tamper with information without touching a piece of
paper or a photocopier. They can also create new electronic files, run their own
programs, and hide evidence of their unauthorized activity.
Basic Security concepts
Three basic security concepts important to information on the internet are
- confidentiality
- integrity
- availability
Concepts relating to the people who use that information are
- authentication
- authorization
- nonrepudiation
Confidentiality
When information is read or copied by someone not authorized to do so, the result is
known as loss of confidentiality
For some types of information, confidentiality is a very
important attribute. Examples include research data, medical and insurance records, new
product specifications, and corporate investment strategies. In some locations, there may
be a legal obligation to protect the privacy of individuals. This is particularly true for
banks and loan companies; debt collectors; businesses that extend credit to their
customers or issue credit cards; hospitals, doctors’ offices, and medical testing
laboratories; individuals or agencies that offer services such as psychological counseling
or drug treatment; and agencies that collect taxes.
Integrity
-
Information can be corrupted when it is available on an insecure network. When
information is modified in unexpected ways, the result is known as loss of integrity.
- This means that unauthorized changes are made to information, whether by human error or
intentional tampering. Integrity is particularly important for critical safety and financial
data used for activities such as electronic funds transfers, air traffic control, and financial
accounting.
Availability
- Information can be erased or become inaccessible, resulting in loss of availability.
- This means that people who are authorized to get information cannot get what they need.
- Availability is often the most important attribute in service-oriented businesses that
depend on information (for example, airline schedules and online inventory systems)
- Availability of the network itself is important to anyone whose business or education
relies on a network connection. When users cannot access the network or specific
services provided on the network, they experience a denial of service.
- To make information available to those who need it and who can be trusted with it,
organizations use authentication and authorization
- Authentication is proving that a user
is the person he or she claims to be. That proof may involve something the user knows
(such as a password), something the user has (such as a “smartcard”), or something about
the user that proves the person’s identity (such as a fingerprint)
- Authorization is the act
of determining whether a particular user (or computer system) has the right to carry out a
certain activity, such as reading a file or running a program
- Authentication and authorization go hand in hand
- Users must be authenticated before
carrying out the activity they are authorized to perform.
- Security is strong when the means of authentication cannot later be refuted—the user cannot later deny that he or she
performed the activity. This is known as nonrepudiation.
These concepts of information security also apply to the term information security; that
is, internet users want to be assured that
- they can trust the information they use
- the information they are responsible for will be shared only in the manner that they
expect
- the information will be available when they need it
- the systems they use will process information in a timely and trustworthy manner
In addition, information assurance extends to systems of all kinds, including large-scale
distributed systems, control systems, and embedded systems, and it encompasses systems
with hardware, software, and human components. The technologies of information
assurance address system intrusions and compromises to information.