SlideShare a Scribd company logo
3
Most read
4
Most read
5
Most read
Principles of Information Security,
Fifth Edition
Chapter 2
The Need for Security
Lesson 4–Technical Hardware
Learning Objectives
• Upon completion of this lesson, you should be able
to:
– Describe the relationship between technical hardware
failures and errors ,and technical software failures and
errors against information within systems.
Principles of Information Security, Fifth Edition 2
Technical Hardware Failures or Errors
• They occur when a manufacturer distributes
equipment containing a known or unknown flaw.
• They can cause the system to perform outside of
expected parameters, resulting in unreliable
service or lack of availability.
• Some errors are terminal and some are
intermittent.
• Intel Pentium CPU failure
• Mean time between failure measures the amount of
time between hardware failures.
Principles of Information Security, Fifth Edition 3
Technical Software Failures or Errors
(cont’d)
• Large quantities of computer code are written,
debugged, published, and sold before all bugs are
detected and resolved.
• Combinations of certain software and hardware
can reveal new software bugs.
• Entire Web sites are dedicated to documenting
bugs.
• Open Web Application Security Project (OWASP)
is dedicated to helping organizations
create/operate trustworthy software and publishes
a list of top security risks.
Principles of Information Security, Fifth Edition 4
The Deadly Sins in Software Security
• Common failures in software development:
– Buffer overruns
– Command injection
– Cross-site scripting (XSS)
– Failure to handle errors
– Failure to protect network traffic
– Failure to store and protect data securely
– Failure to use cryptographically strong random
numbers
Principles of Information Security, Fifth Edition 5
The Deadly Sins in Software Security
(cont’d)
• Common failures in software development (cont’d):
– Format string problems
– Neglecting change control
– Improper file access
– Improper use of SSL
– Information leakage
– Integer bugs (overflows/underflows)
– Race conditions
– SQL injection
Principles of Information Security, Fifth Edition 6
The Deadly Sins in Software Security
(cont’d)
• Problem areas in software development:
– Trusting network address resolution
– Unauthenticated key exchange
– Use of magic URLs and hidden forms
– Use of weak password-based systems
– Poor usability
Principles of Information Security, Fifth Edition 7
Technological Obsolescence
• Antiquated/outdated infrastructure can lead to
unreliable, untrustworthy systems.
• Proper managerial planning should prevent
technology obsolescence.
• IT plays a large role.
Principles of Information Security, Fifth Edition 8
Theft
• Illegal taking of another’s physical, electronic, or
intellectual property
• Physical theft is controlled relatively easily.
• Electronic theft is a more complex problem; the
evidence of crime is not readily apparent.
Principles of Information Security, Fifth Edition 9
Secure Software Development
• Many information security issues discussed here
are caused by software elements of the system.
• Development of software and systems is often
accomplished using methodology such as systems
development life cycle (SDLC).
• Many organizations recognize the need for security
objectives in SDLC and have included procedures
to create more secure software.
• This software development approach is known as
Software Assurance (SA).
Principles of Information Security, Fifth Edition 10
Software Assurance and the SA
Common Body of Knowledge
• A national effort is underway to create a common
body of knowledge focused on secure software
development.
• U.S. Department of Defense and Department of
Homeland Security supported the Software
Assurance Initiative, which resulted in the
publication of Secure Software Assurance (SwA)
Common Body of Knowledge (CBK).
• SwA CBK serves as a strongly recommended
guide to developing more secure applications.
Principles of Information Security, Fifth Edition 11
Software Design Principles
• Good software development results in secure
products that meet all design specifications.
• Some commonplace security principles:
– Keep design simple and small
– Access decisions by permission not exclusion
– Every access to every object checked for authority
– Design depends on possession of keys/passwords
– Protection mechanisms require two keys to unlock
– Programs/users utilize only necessary privileges
Principles of Information Security, Fifth Edition 12
Software Design Principles (cont’d)
• Some commonplace security principles:
– Minimize mechanisms common to multiple users
– Human interface must be easy to use so users
routinely/automatically use protection mechanisms.
Principles of Information Security, Fifth Edition 13
Summary
• Unlike any other aspect of IT, information security’s
primary mission is to ensure things stay the way
they are.
• Information security performs four important
functions:
– Protects organization’s ability to function
– Enables safe operation of applications implemented
on organization’s IT systems
– Protects data the organization collects and uses
– Safeguards the technology assets in use at the
organization
Principles of Information Security, Fifth Edition 14
Summary (cont’d)
• Threat: object, person, or other entity representing
a constant danger to an asset
• Management effectively protects its information
through policy, education, training, and technology
controls.
• Attack: a deliberate act that exploits vulnerability
• Secure systems require secure software.
Principles of Information Security, Fifth Edition 15

More Related Content

PPT
Introduction to information security
Kumawat Dharmpal
 
PPT
Information Assurance And Security - Chapter 2 - Lesson 3
MLG College of Learning, Inc
 
PPT
Information Assurance And Security - Chapter 2 - Lesson 1
MLG College of Learning, Inc
 
PDF
SE2018_Lec 18_ Design Principles and Design Patterns
Amr E. Mohamed
 
PPT
Information Assurance And Security - Chapter 1 - Lesson 2
MLG College of Learning, Inc
 
PPT
Chapter2 the need to security
Dhani Ahmad
 
PPT
Security and information assurance
bdemchak
 
PDF
Basics of Cyber Security
Nikunj Thakkar
 
Introduction to information security
Kumawat Dharmpal
 
Information Assurance And Security - Chapter 2 - Lesson 3
MLG College of Learning, Inc
 
Information Assurance And Security - Chapter 2 - Lesson 1
MLG College of Learning, Inc
 
SE2018_Lec 18_ Design Principles and Design Patterns
Amr E. Mohamed
 
Information Assurance And Security - Chapter 1 - Lesson 2
MLG College of Learning, Inc
 
Chapter2 the need to security
Dhani Ahmad
 
Security and information assurance
bdemchak
 
Basics of Cyber Security
Nikunj Thakkar
 

What's hot (20)

PPT
Information Assurance And Security - Chapter 1 - Lesson 4
MLG College of Learning, Inc
 
PPTX
Social & professional issues in IT
Rohana K Amarakoon
 
PPT
Information Assurance And Security - Chapter 3 - Lesson 3
MLG College of Learning, Inc
 
PPTX
Network security - Defense in Depth
Dilum Bandara
 
PPTX
Network security
mena kaheel
 
PPTX
Types of malware
techexpert2345
 
PPTX
MIS: Information Security Management
Jonathan Coleman
 
PPT
Legal, Ethical and professional issues in Information Security
Gamentortc
 
PDF
Information Security Lecture Notes
FellowBuddy.com
 
PPT
Information security
razendar79
 
PPT
Information Assurance And Security - Chapter 2 - Lesson 2
MLG College of Learning, Inc
 
PPT
Malware forensics
Sameera Amjad
 
PPTX
Module 2 - Information Assurance Concepts.pptx
Humphrey Humphrey
 
PPTX
Intrusion Detection System(IDS)
Vivek Faldu
 
PPTX
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Dheeraj Kataria
 
PPTX
Data Security Explained
Happiest Minds Technologies
 
PPTX
Information Security and Privacy
Anika Tasnim Hafiz
 
PPT
Security Policies
phanleson
 
PPTX
Malicious software
CAS
 
Information Assurance And Security - Chapter 1 - Lesson 4
MLG College of Learning, Inc
 
Social & professional issues in IT
Rohana K Amarakoon
 
Information Assurance And Security - Chapter 3 - Lesson 3
MLG College of Learning, Inc
 
Network security - Defense in Depth
Dilum Bandara
 
Network security
mena kaheel
 
Types of malware
techexpert2345
 
MIS: Information Security Management
Jonathan Coleman
 
Legal, Ethical and professional issues in Information Security
Gamentortc
 
Information Security Lecture Notes
FellowBuddy.com
 
Information security
razendar79
 
Information Assurance And Security - Chapter 2 - Lesson 2
MLG College of Learning, Inc
 
Malware forensics
Sameera Amjad
 
Module 2 - Information Assurance Concepts.pptx
Humphrey Humphrey
 
Intrusion Detection System(IDS)
Vivek Faldu
 
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Dheeraj Kataria
 
Data Security Explained
Happiest Minds Technologies
 
Information Security and Privacy
Anika Tasnim Hafiz
 
Security Policies
phanleson
 
Malicious software
CAS
 
Ad

Similar to Information Assurance And Security - Chapter 2 - Lesson 4 (20)

PDF
Embedded Systems Security
Malachi Jones
 
PDF
Java Card Platform Security and Performance
Eric Vétillard
 
PDF
IoT Security and Privacy Considerations
Kenny Huang Ph.D.
 
PPT
Chapter 5 cyber security in computer.ppt
ubaidullah75790
 
PPTX
Enumerating software security design flaws throughout the SSDLC
John M. Willis
 
PPTX
Enumerating software security design flaws throughout the ssdlc cosac - 201...
John M. Willis
 
PPT
Survey Presentation About Application Security
Nicholas Davis
 
PPTX
Starting your Career in Information Security
Ahmed Sayed-
 
PDF
Hardware Security on Vehicles
Priyanka Aash
 
PPTX
OWASP Mobile TOP 10 2014
Islam Azeddine Mennouchi
 
PPTX
SDL: Secure design principles
sluge
 
PPTX
Cyber security - It starts with the embedded system
Rogue Wave Software
 
PDF
Oracle ADF Architecture TV - Design - Designing for Security
Chris Muir
 
PPT
Lecture Course Outline and Secure SDLC.ppt
DrBasemMohamedElomda
 
PDF
Applying formal methods to existing software by B.Monate
Mahaut Gouhier
 
PPT
4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt
gealehegn
 
PPT
ITE v5.0 - Chapter 10
Irsandi Hasan
 
PPTX
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...
team-WIBU
 
PPT
Security Testing for Mobile and Web Apps
DrKaramHatim
 
PDF
Tips and Tricks for Building Secure Mobile Apps
TechWell
 
Embedded Systems Security
Malachi Jones
 
Java Card Platform Security and Performance
Eric Vétillard
 
IoT Security and Privacy Considerations
Kenny Huang Ph.D.
 
Chapter 5 cyber security in computer.ppt
ubaidullah75790
 
Enumerating software security design flaws throughout the SSDLC
John M. Willis
 
Enumerating software security design flaws throughout the ssdlc cosac - 201...
John M. Willis
 
Survey Presentation About Application Security
Nicholas Davis
 
Starting your Career in Information Security
Ahmed Sayed-
 
Hardware Security on Vehicles
Priyanka Aash
 
OWASP Mobile TOP 10 2014
Islam Azeddine Mennouchi
 
SDL: Secure design principles
sluge
 
Cyber security - It starts with the embedded system
Rogue Wave Software
 
Oracle ADF Architecture TV - Design - Designing for Security
Chris Muir
 
Lecture Course Outline and Secure SDLC.ppt
DrBasemMohamedElomda
 
Applying formal methods to existing software by B.Monate
Mahaut Gouhier
 
4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt
gealehegn
 
ITE v5.0 - Chapter 10
Irsandi Hasan
 
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...
team-WIBU
 
Security Testing for Mobile and Web Apps
DrKaramHatim
 
Tips and Tricks for Building Secure Mobile Apps
TechWell
 
Ad

More from MLG College of Learning, Inc (20)

PPTX
PC111.Lesson1
MLG College of Learning, Inc
 
PPTX
PC111-lesson1.pptx
MLG College of Learning, Inc
 
PPTX
PC LEESOON 6.pptx
MLG College of Learning, Inc
 
PPTX
PC 106 PPT-09.pptx
MLG College of Learning, Inc
 
PPTX
PC 106 PPT-07
MLG College of Learning, Inc
 
PPTX
PC 106 PPT-01
MLG College of Learning, Inc
 
PPTX
PC 106 Slide 04
MLG College of Learning, Inc
 
PPTX
PC 106 Slide no.02
MLG College of Learning, Inc
 
PPTX
pc-106-slide-3
MLG College of Learning, Inc
 
PPTX
PC 106 Slide 2
MLG College of Learning, Inc
 
PPTX
PC 106 Slide 1.pptx
MLG College of Learning, Inc
 
PDF
Db2 characteristics of db ms
MLG College of Learning, Inc
 
PDF
Db1 introduction
MLG College of Learning, Inc
 

Recently uploaded (20)

PPTX
CDH. pptx
AneetaSharma15
 
PPTX
A Smarter Way to Think About Choosing a College
Cyndy McDonald
 
PDF
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
PPTX
Sonnet 130_ My Mistress’ Eyes Are Nothing Like the Sun By William Shakespear...
DhatriParmar
 
PPTX
Continental Accounting in Odoo 18 - Odoo Slides
Celine George
 
PDF
Virat Kohli- the Pride of Indian cricket
kushpar147
 
PDF
Health-The-Ultimate-Treasure (1).pdf/8th class science curiosity /samyans edu...
Sandeep Swamy
 
PPTX
How to Manage Leads in Odoo 18 CRM - Odoo Slides
Celine George
 
DOCX
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
PPTX
Cleaning Validation Ppt Pharmaceutical validation
Ms. Ashatai Patil
 
PDF
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 
PPTX
BASICS IN COMPUTER APPLICATIONS - UNIT I
suganthim28
 
PDF
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
PPTX
Measures_of_location_-_Averages_and__percentiles_by_DR SURYA K.pptx
Surya Ganesh
 
PPTX
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
DOCX
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
PPTX
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
PDF
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
PPTX
Command Palatte in Odoo 18.1 Spreadsheet - Odoo Slides
Celine George
 
PPTX
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
CDH. pptx
AneetaSharma15
 
A Smarter Way to Think About Choosing a College
Cyndy McDonald
 
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
Sonnet 130_ My Mistress’ Eyes Are Nothing Like the Sun By William Shakespear...
DhatriParmar
 
Continental Accounting in Odoo 18 - Odoo Slides
Celine George
 
Virat Kohli- the Pride of Indian cricket
kushpar147
 
Health-The-Ultimate-Treasure (1).pdf/8th class science curiosity /samyans edu...
Sandeep Swamy
 
How to Manage Leads in Odoo 18 CRM - Odoo Slides
Celine George
 
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
Cleaning Validation Ppt Pharmaceutical validation
Ms. Ashatai Patil
 
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 
BASICS IN COMPUTER APPLICATIONS - UNIT I
suganthim28
 
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
Measures_of_location_-_Averages_and__percentiles_by_DR SURYA K.pptx
Surya Ganesh
 
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
Command Palatte in Odoo 18.1 Spreadsheet - Odoo Slides
Celine George
 
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 

Information Assurance And Security - Chapter 2 - Lesson 4

  • 1. Principles of Information Security, Fifth Edition Chapter 2 The Need for Security Lesson 4–Technical Hardware
  • 2. Learning Objectives • Upon completion of this lesson, you should be able to: – Describe the relationship between technical hardware failures and errors ,and technical software failures and errors against information within systems. Principles of Information Security, Fifth Edition 2
  • 3. Technical Hardware Failures or Errors • They occur when a manufacturer distributes equipment containing a known or unknown flaw. • They can cause the system to perform outside of expected parameters, resulting in unreliable service or lack of availability. • Some errors are terminal and some are intermittent. • Intel Pentium CPU failure • Mean time between failure measures the amount of time between hardware failures. Principles of Information Security, Fifth Edition 3
  • 4. Technical Software Failures or Errors (cont’d) • Large quantities of computer code are written, debugged, published, and sold before all bugs are detected and resolved. • Combinations of certain software and hardware can reveal new software bugs. • Entire Web sites are dedicated to documenting bugs. • Open Web Application Security Project (OWASP) is dedicated to helping organizations create/operate trustworthy software and publishes a list of top security risks. Principles of Information Security, Fifth Edition 4
  • 5. The Deadly Sins in Software Security • Common failures in software development: – Buffer overruns – Command injection – Cross-site scripting (XSS) – Failure to handle errors – Failure to protect network traffic – Failure to store and protect data securely – Failure to use cryptographically strong random numbers Principles of Information Security, Fifth Edition 5
  • 6. The Deadly Sins in Software Security (cont’d) • Common failures in software development (cont’d): – Format string problems – Neglecting change control – Improper file access – Improper use of SSL – Information leakage – Integer bugs (overflows/underflows) – Race conditions – SQL injection Principles of Information Security, Fifth Edition 6
  • 7. The Deadly Sins in Software Security (cont’d) • Problem areas in software development: – Trusting network address resolution – Unauthenticated key exchange – Use of magic URLs and hidden forms – Use of weak password-based systems – Poor usability Principles of Information Security, Fifth Edition 7
  • 8. Technological Obsolescence • Antiquated/outdated infrastructure can lead to unreliable, untrustworthy systems. • Proper managerial planning should prevent technology obsolescence. • IT plays a large role. Principles of Information Security, Fifth Edition 8
  • 9. Theft • Illegal taking of another’s physical, electronic, or intellectual property • Physical theft is controlled relatively easily. • Electronic theft is a more complex problem; the evidence of crime is not readily apparent. Principles of Information Security, Fifth Edition 9
  • 10. Secure Software Development • Many information security issues discussed here are caused by software elements of the system. • Development of software and systems is often accomplished using methodology such as systems development life cycle (SDLC). • Many organizations recognize the need for security objectives in SDLC and have included procedures to create more secure software. • This software development approach is known as Software Assurance (SA). Principles of Information Security, Fifth Edition 10
  • 11. Software Assurance and the SA Common Body of Knowledge • A national effort is underway to create a common body of knowledge focused on secure software development. • U.S. Department of Defense and Department of Homeland Security supported the Software Assurance Initiative, which resulted in the publication of Secure Software Assurance (SwA) Common Body of Knowledge (CBK). • SwA CBK serves as a strongly recommended guide to developing more secure applications. Principles of Information Security, Fifth Edition 11
  • 12. Software Design Principles • Good software development results in secure products that meet all design specifications. • Some commonplace security principles: – Keep design simple and small – Access decisions by permission not exclusion – Every access to every object checked for authority – Design depends on possession of keys/passwords – Protection mechanisms require two keys to unlock – Programs/users utilize only necessary privileges Principles of Information Security, Fifth Edition 12
  • 13. Software Design Principles (cont’d) • Some commonplace security principles: – Minimize mechanisms common to multiple users – Human interface must be easy to use so users routinely/automatically use protection mechanisms. Principles of Information Security, Fifth Edition 13
  • 14. Summary • Unlike any other aspect of IT, information security’s primary mission is to ensure things stay the way they are. • Information security performs four important functions: – Protects organization’s ability to function – Enables safe operation of applications implemented on organization’s IT systems – Protects data the organization collects and uses – Safeguards the technology assets in use at the organization Principles of Information Security, Fifth Edition 14
  • 15. Summary (cont’d) • Threat: object, person, or other entity representing a constant danger to an asset • Management effectively protects its information through policy, education, training, and technology controls. • Attack: a deliberate act that exploits vulnerability • Secure systems require secure software. Principles of Information Security, Fifth Edition 15