Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Методические указания ИБ-1.doc
Скачиваний:
0
Добавлен:
01.07.2025
Размер:
481.79 Кб
Скачать

Positive and negative

I / we / you / they

’ve (have), haven’t

lived abroad

He / she/ it

’s (has), hasn’t

Question

Have

I / we / you / they

been to the US?

Has

He / she/ it

Make sentences in the Present Perfect

1. You / do / homework?

2. You / make / decision / yet?

3. How long / know / Jamie?

4. She / be / Sweden / twice

5. Their plane / just / land

6. Where / you/ be?

7. What / you / do / your hair?

8. Surf the internet and find additional information about the usage of information security.

Unit 2 The Main Principles of Information Security

Warm Up

1. What are the main attributes of Information Security?

2. When do we use the term availability?

3. What information is considered to be secret?

Reading

1. Read the text below and fill in the gaps in the following sentences.

1) The classification of the information should …………………. and hence the appropriate safeguards.

2) Integrity loss happens when information ……………. without the modification being authorized.

3) Physical confidential loss can happen through…………………………..

Confidentiality, Integrity and Availability

A key aspect of Information Security is to preserve the confidentiality, integrity and availability of an organization’s information. It is only with this information that it can engage in commercial activities. Loss of one or more of these attributes, can threaten the continued existence of even the largest corporate entities.

Confidentiality: assurance that information is shared only among authorized persons or organizations. Breaches of Confidentiality can occur when data is not handled in a manner adequate to safeguard the confidentiality of the information concerned. Such disclosure can take place by word of mouth, by printing, copying, e-mailing or creating documents and other data etc. The classification of the information should determine confidentiality and hence the appropriate safeguards.

Confidentiality loss happens when information can be viewed (read) by individuals who shouldn’t access it. Loss of confidentiality can happen physically or electronically. Electronic confidentiality loss can happen when the clients and servers aren’t encrypting their communications. This allows malicious entities to view private communications. Physical confidential loss can happen through social engineering or through theft. This typically means having laptops stolen.

Integrity: assurance that the information is authentic and complete. The term Integrity is used frequently when considering Information Security as it is represents one of the primary indicators of security (or lack of it). The integrity of data is not only whether the data is 'correct', but whether it can be trusted and relied upon. For example, making copies (say by e-mailing a file) of a sensitive document, threatens both confidentiality and the integrity of the information.

Integrity loss happens when information is modified without the modification being authorized. This doesn’t mean that an unauthorized party has to cause the integrity loss to happen. An example would be a system administrator deleting an account record they weren’t authorized to delete. Integrity loss can happen either accidentally or through malicious intent. Malicious integrity loss can happen when a user purposely adds, deletes, or modifies database records. This can occur either through an authorized party (someone who has the access to actually modify the record) or by an unauthorized party when the user has access that they shouldn’t have. Accidental integrity loss happens when a system modifies or deletes records that it shouldn’t. This can happen when a virus infects a system or when a user does something that he didn’t intend to do. This is often why systems will verify that you want a file deleted, before it actually does so.

Availability: ensuring that authorized users have access to information and associated assets when required. This can be accomplished utilizing data backup plans, disaster recovery plans, and business continuity/recovery plans.

Availability is the simple idea that when a user or system attempts to access something, it is available to be accessed. This is extremely important for mission critical systems. Availability for these systems is so critical that most companies have business continuity plans (BCP’s) in order for their systems to have redundancy. Just like confidentiality and integrity loss, availability loss can happen by accident, a car crashing into a fiber pole disabling access to a system, or through malicious intent, such as a Denial-of-Service attack.