1. Home
  2. Training Library
  3. Security
  4. Courses
  5. IT Security Fundamentals

Fundamentals of Information Security

Developed with
QA
play-arrow
Start course
Overview
Difficulty
Beginner
Duration
1h 49m
Students
138
Ratings
5/5
starstarstarstarstar
Description

IT Security Fundamentals 

This is a beginner-level course designed to provide you with an introduction to Information technology security concepts. The course will suit anyone interested in understanding the fundamentals of security concepts from a business and technology perspective.  

Outline 

In this course we will provide:

  • An introduction to the concept of Information Security
  • We will cover the basic concepts that pertain to Information Security
  • We then begin to answer the question - what is information security and why do we need it?
  • We then explore some of the frameworks, controls and activities we can implement to control information security 

Pre-requisites 

This is a beginner level course where having a basic understanding of computing concepts will be useful 

Feedback 

Please reach out to us at support@cloudacademy.com with any questions, comments or feedback. 

 

Transcript

Hello and welcome back. We spoke of Information assurance and information security and how they kind of fit together overall, as you can see, we have the strategic planning happening over there and this is more tactical and technically focused, and the stresses with our technologies; Security applications and software infrastructure, building actual infrastructure, all that type of stuff comes in to play in and around this area. And then we have the information assurance to make sure it's all doing its job, so that we get that feedback. So metrics become a very important thing overall.

So these are the fundamentals of information security, and as you can see, there are three of them.  We have processes, technology and people. The least reliable component of the security triangle is the human factor.

Information security is a combination of those three things, as is actually taking care of security. Putting good processes in place, combining them with technology, and then making sure we've got people to take care of those actual processes and that technology.

So this kind of falls around the cyber security style area that we're actually attempting to take care of, but it spreads out into information security as well.

The things that we are using to protect information security, those same three tenants are the very things that people will attack. We can attack processes for an organization by anticipating or knowing a security process. I know how to circumvent system A and I wonder if it works in a similar way with a different system. So things such as circumvent the process. Leave this process, start this process, you know how users are added to the domain, the technical process.

Technology. If we understand the technology, we can hack it! We can break it, we can get around it, and that's what we always aim to do if we are attacking a system, and then obviously people. There would be no point of having all these great processes and technology in place if we didn't actually have trained workers. The users are the important things in cyber security or information security. What can the company be liable for, if something were to transpire? If they have certifications there are legal obligations to train users. Otherwise the company begins to automatically fall short of their own certifications and not be compliant to the standards. 

So, training is important. It's also important to make sure individuals can actually do the jobs you're employing them for, that's the other reason for why these are important.

Let's take antiviruses and technology. What does antivirus actually do first and foremost? It tries to protect our systems from viruses that may be trying to circumvent the vulnerabilities that exist in them. Okay, in order for that to continually work, it has to be up to date.  Then it has to be tested and proven to work within the Organization, which essentially means testing and training are intertwined. We test the Antivirus system and train it for our organization.

In order for that to work properly, we can't just update it and all the rest of that, but in order for that close up thing to happen, we need a process. So we need a policy. We need a policy that's going to tell us how to maintain the software and how it needs updating. We need a process and a policy that's going to tell us how we actually deploy in the first place. You know when we do an individual deployment are we deploying from AD? what are we doing? how does it work? does it get deployed with the image once we first do it?, how do we update it? everything goes into that process, and then obviously the correct maintenance as well.

That process needs to be taught to somebody. We also need a process that's going to come into play when things go wrong. How do we then use that technology to get the best abilities to help the organization? Processes have to be put in place, we have to know them, we have to understand them, but we can't just have the policy and process in place. They have to be communicated to people within the organization, otherwise they’re worthless. And they’re even more worthless if you've got the processes there and nobody understands them.

Antivirus is just one technology that we've taken as an example.. It could be the technology or just the actual machines people use, and the process by which they approach emails (which may look suspicious) and then educating them as to how to actually use their systems as well as the pitfalls and dangers and the processes: how they engage themselves with the process when they see then an email.

As you can see, that all comes together again, you got the technology, you got the process, and the rest. Then you have to calculate risk.

Okay so here's the security policy. Security policy is important. Security policy falls on laws, regulations, requirements, organizational goals and objectives, you know, what we have to do, what we will actually want to do and what we'd like to do and the overall objective which is normally to make money.

Now, some of these things we call intrinsic and extrinsic issues; so, essentially, internal issues and external issues - external being the laws, the regulations, some requirements from standards that we're held to. And then the intrinsic issues being the organizational goals and objectives. we'll put those all together, along with a bit of risk management, and then we’ll a general organizational policy that'll cover our organization in terms of information security, and then we'll have functional implementing policies like your antivirus policy, your clear desk policies and all the rest of that sort of stuff.

And under those, you'll have standards, procedures, baselines, and guidelines. So Those will come into play now, under those functional implementing policies.

So let’s say we’re gonna do a password policy. Here's our password policy and lets include a standard in there. 

our policies are overarching statements about our position on something. So our password policy might be something such as, everyone in the organization must have a secure password. So lets do that. There we go: everyone in the organization must have a secure password. Great, that's our policy.

Underneath that, we're going to have to make that stand up, aren't we? We can't just say it, we've got to back it up. So what do we back it up with? We back it up with some standards. For example, a password policy standard might be something like add at least 8 characters, with at least one capital, one special character, no recognizable words, etc., etc., and a change date requirement. However, you need to keep the policy usable. If you make users change a password too often they are more likely to write the password down, which is, of course, not secure. 

So thats our password standard sitting under our policy. What type of procedure can we have under there? If I was going to write a procedure, let's make it simple, we've got a procedure whereby we change passwords. We build our procedure... Procedures are just instructions essentially, or sets of instructions, that get us to fulfill our standard. so we'll write into our group policy. so let's put here, "Standard will be enforced by group policy and monitored."  So that's our procedure.  This standard then is going to be governed by the actual technology and that will build our procedure. So every time someone writes a password or they try to go and change their password, AD will kick in, apply the standard, and the procedure of handling those passwords and people changing them. And then underneath AD, there'll be a process or procedure. We can even write the procedure if we're building our own systems or software.

Underneath, they would have a guideline and the guideline goes to the people that are actually going to change their passwords or people interacting with our systems. And our guidelines are just  best practices as to how to best create passwords that fit our system.

So it would be something like, "Go to the portal, try making a password that is something like... Go to your web browser, use the Find Three Words App, reverse those words backwards. Add some random characters and try that way." It's a "try that way", it's not prescriptive as to what you must do in order to create the password. It's a guideline to help you get to where you're supposed to be so that you can actually adhere to the standard. So guidelines aren't mandatory procedures and standards are.

Baselines are mandatory as well. Baselines themselves are essentially standards, if you will, that we build for particular systems and we use those so that we actually know what's required for different environments. 

 

About the Author
Avatar
King Samuel
Cyber Security Trainer
Students
1176
Courses
6
Learning Paths
1

Originating from a systems administration/network architecture career, a solid part of his career building networks for educational institutes. With security being a mainstay his implementation he grew a strong passion for everything cyber orientated especially social engineering. The educational experience led to him mentoring young women in IT, helping them to begin a cyber career. He is a recipient of the Cisco global cyber security scholarship. A CCNA Cyber Ops holder and elected for the CCNP Cyber Ops program.

Covered Topics