[TOC]
↗ Cryptology & Secure Communication ↗ Risk Management ↗ Software Security
↗ Cyber Ranges & Labs ↗ SEED Project
Computer Security & Risk Management
↗ Computer Architecture /Computer Organization & Architecture
Information security, sometimes shortened to InfoSec, is the practice of protecting information by mitigating information risks.
It is part of information risk management.
It typically involves preventing or reducing the probability of unauthorized/inappropriate access to data, or the unlawful use, disclosure, disruption, deletion, corruption, modification, inspection, recording, or devaluation of information. It also involves actions intended to reduce the adverse impacts of such incidents. Protected information may take any form, e.g. electronic or physical, tangible (e.g. paperwork) or intangible (e.g. knowledge).
Information security's primary focus is the balanced protection of the confidentiality, integrity, and availability of data (also known as the CIA triad) while maintaining a focus on efficient policy implementation, all without hampering organization productivity. This is largely achieved through a structured risk management process that involves:
- identifying information and related assets, plus potential threats, vulnerabilities, and impacts;
- evaluating the risks;
- deciding how to address or treat the risks i.e. to avoid, mitigate, share or accept them;
- where risk mitigation is required, selecting or designing appropriate security controls and implementing them;
- monitoring the activities, making adjustments as necessary to address any issues, changes and improvement opportunities.
To standardize this discipline, academics and professionals collaborate to offer guidance, policies, and industry standards on password, antivirus software, firewall, encryption software, legal liability, security awareness and training, and so forth. This standardization may be further driven by a wide variety of laws and regulations that affect how data is accessed, processed, stored, transferred and destroyed. However, the implementation of any standards and guidance within an entity may have limited effect if a culture of continual improvement isn't adopted.
#infoSec #Cybersecurity
最开始只有信息安全。 安全圈里的大佬们,一直觉得信息安全很重要,要从“计算机科学与技术”一级学科中独立出来,自成一级学科。怎奈,大佬们上书了数年,都以失败告终。
终于有一天,中央提出了“没有网络安全,就没有国家安全”。安全圈里的大佬们觉得机会来了。于是不申请“信息安全”一级学科,改为申请“网络空间安全”一级学科。
过审了。
“网络空间安全”就成了一级学科。招生指标更多了。
作者:吉事尚左 链接:https://www.zhihu.com/question/318261855/answer/818206085 来源:知乎 著作权归作者所有。商业转载请联系作者获得授权,非商业转载请注明出处。
[!links] ↗ Cybersecurity Threats & Attacks
[!ABSTRACT] 网络空间安全 (cybersecurity):广泛涵盖了基础设施及信息系统、信息资源本身、信息资源在社会/国家层面的影响。与信息安全以数据保护为中心不同,网络空间安全强调数据+人(社会组织)两个核心资产的保护。与这些核心资产相关的资产,如信息系统软硬件,社会舆论,国家领土完整性等,也自然而然地囊括进来。 ↗ CyberSecurity /What is Cybersecurity?
信息安全 (information security):重点在信息资源本身的保护。当然也涉及支持信息资源的信息系统的保护,但是对系统的保护的目的也是从保护信息资源本身出发的。 ↗ Cryptology & Secure Communication
📖《网络攻防术》朱俊虎,网络空间安全学科规划教材
信息本身的机密性(Confidentiality)、完整性(Integrity)和可用性(Availability)的保持,即防止未经授权使用信息、防止对信息的非法修改和破坏、确保及时可靠地使用信息。
- 机密性:确保信息没有非授权的泄漏,不被非授权的个人、组织和计算机程序使用
- 完整性:确保信息没有遭到篡改和破坏
- 可用性:确保拥有授权的用户或程序可以及时、正常使用信息
网络空间安全的最终任务是保护信息资源被合法用户安全使用,并禁止非法用户、入侵者、攻击者和黑客非法偷盗、使用信息资源。
网络空间安全的保护机制包括电磁辐射、环境安全、计算机技术、网络技术等技术因素,还包括信息安全管理(含系统安全管理、安全服务管理和安全机制管理)、法律和心理因素等机制。
国际信息系统安全认证组织(InternationalInformation Systems Security Consortium,简称ISC2)将信息安全划分为5重屏障共10大领域并给出了它们涵盖的知识结构
[!links] ↗ Core Cryptographic Properties Threats & Countermeasures
The CIA Triad. The triad seems to have first been mentioned in a NIST https://en.wikipedia.org/wiki/NIST publication in 1977
🔗 https://en.wikipedia.org/wiki/Information_security#CIA_triad
The "CIA triad" of confidentiality, integrity, and availability is at the heart of information security.[66] The concept was introduced in the Anderson Report in 1972 and later repeated in The Protection of Information in Computer Systems. The abbreviation was coined by Steve Lipner around 1986.[67]
Debate continues about whether or not this triad is sufficient to address rapidly changing technology and business requirements, with recommendations to consider expanding on the intersections between availability and confidentiality, as well as the relationship between security and privacy.[4] Other principles such as "accountability" have sometimes been proposed.[68] It has been pointed out that issues such as non-repudiation do not fit well within the three core concepts.[citation needed]
🔗 https://en.wikipedia.org/wiki/Information_security#Confidentiality
In information security, confidentiality "is the property, that information is not made available or disclosed to unauthorized individuals, entities, or processes." While similar to "privacy", the two words are not interchangeable. Rather, confidentiality is a component of privacy that is implemented to protect data from unauthorized viewers. Examples of confidentiality of electronic data being compromised include laptop theft, password theft, or sensitive emails being sent to the incorrect individuals
数据完整性是防止非法实体对交换数据的修改、插入、替换和删除,或者如果被修改、插入、替换和删除时可以被检测出来。数据完整性可以通过消息认证模式来保证。
🔗 https://en.wikipedia.org/wiki/Information_security#Integrity
In IT security, data integrity means maintaining and assuring the accuracy and completeness of data over its entire lifecycle. This means that data cannot be modified in an unauthorized or undetected manner. This is not the same thing as referential integrity in databases, although it can be viewed as a special case of consistency as understood in the classic ACID model of transaction processing
More broadly, integrity is an information security principle that involves human/social, process, and commercial integrity, as well as data integrity. As such it touches on aspects such as credibility, consistency, truthfulness, completeness, accuracy, timeliness, and assurance.
Tip
🔗 https://textbook.cs161.org/crypto/intro.html
You might be thinking that authenticity and integrity seem very closely related, and you would be correct; it makes sense that before you can prove that a message came from a particular person, you first have to prove that the message was not changed. In other words, ==before you can prove authenticity, you first have to be able to prove integrity==. However, these are not identical properties and we will take a look at some edge cases as we delve further into the cryptographic unit.
[!links] ↗ ICT System Reliability (Correctness) & Verification
↗ Authentication (身份鉴别) ↗ Message Authentication (报文鉴别,消息鉴别)
🔗 https://en.wikipedia.org/wiki/Information_security#Availability
For any information system to serve its purpose, the information must be available when it is needed.[78] This means the computing systems used to store and process the information, the security controls used to protect it, and the communication channels used to access it must be functioning correctly.[79] 🔗 High availability systems aim to remain available at all times, preventing service disruptions due to power outages, hardware failures, and system upgrades.[80] Ensuring availability also involves preventing denial-of-service attacks, such as a flood of incoming messages to the target system, essentially forcing it to shut down.[81]
In the realm of information security, availability can often be viewed as one of the most important parts of a successful information security program.[citation needed] Ultimately end-users need to be able to perform job functions; by ensuring availability an organization is able to perform to the standards that an organization's stakeholders expect.[82] This can involve topics such as proxy configurations, outside web access, the ability to access shared drives and the ability to send emails.[83] A successful information security team involves many different key roles to mesh and align for the "CIA" triad to be provided effectively.[84]
[!links] ↗ Other Cryptographic Properties Threats & Countermeasures
Debate continues about whether or not this CIA triad is sufficient to address rapidly changing technology and business requirements, with recommendations to consider expanding on the intersections between availability and confidentiality, as well as the relationship between security and privacy.
- In 1992 and revised in 2002, the OECD's _Guidelines for the Security of Information Systems and Networks proposed the nine generally accepted principles: awareness, responsibility, response, ethics, democracy, risk assessment, security design and implementation, security management, and reassessment. Building upon those, in 2004 the NIST's _Engineering Principles for Information Technology Security proposed 33 principles. From each of these derived guidelines and practices.
- In 1998, Donn Parker proposed an alternative model for the classic CIA triad that he called the six atomic elements of information. The elements are confidentiality, possession, integrity, authenticity, availability, and utility. The merits of the Parkerian Hexad are a subject of debate amongst security professionals.
- In 2011, The Open Group published the information security management standard O-ISM3. This standard proposed an operational definition of the key concepts of security, with elements called "security objectives", related to access control (9), availability (3), data quality (1), compliance, and technical (4). In 2009, DoD Software Protection Initiative Archived 2016-09-25 at the Wayback Machine released the Three Tenets of Cybersecurity Archived 2020-05-10 at the Wayback Machinewhich are System Susceptibility, Access to the Flaw, and Capability to Exploit the Flaw. Neither of these models are widely adopted.
抗抵赖机制旨在生成、收集、维护有关已声明的事件或动作的证据,并使该证据可得并且确认该证据,以此来解决关于此事件或动作发生或未发生而引起的争议。
🔗 https://en.wikipedia.org/wiki/Information_security#Non-repudiation
In law, non-repudiation implies one's intention to fulfill their obligations to a contract. It also implies that one party of a transaction cannot deny having received a transaction, nor can the other party deny having sent a transaction.
It is important to note that while technology such as cryptographic systems can assist in non-repudiation efforts, the concept is at its core a legal concept transcending the realm of technology. It is not, for instance, sufficient to show that the message matches a digital signature signed with the sender's private key, and thus only the sender could have sent the message, and nobody else could have altered it in transit (data integrity). The alleged sender could in return demonstrate that the digital signature algorithm is vulnerable or flawed, or allege or prove that his signing key has been compromised. The fault for these violations may or may not lie with the sender, and such assertions may or may not relieve the sender of liability, but the assertion would invalidate the claim that the signature necessarily proves authenticity and integrity. As such, the sender may repudiate the message (because authenticity and integrity are pre-requisites for non-repudiation)
A related property that we may want our cryptosystem to have is deniability. If Alice and Bob communicate securely, Alice might want to publish a message from Bob and show it to a judge, claiming that it came from Bob. If the cryptosystem has deniability, there is no cryptographic proof available to guarantee that Alice’s published message came from Bob. For example, consider a case where Alice and Bob use the same key to generate a signature on a message, and Alice publishes a message with a valid signature. Then the judge cannot be sure that the message came from Bob–the signature could have plausibly been created by Alice.
- Know your threat model
- Consider Human Factors
- Security is economics
- Keep it simple, complexity creates more opportunities for things to go wrong
- Detect if you can’t prevent
- Defense in depth
- Least privilege
- A subject should have only the necessary rights and not more
- Separation of responsibility /privilege
- A process should be constructed in parts with separate access rights
- Ensure complete mediation
- Shannon’s Maxim /Kerckhoff’s Principle (Open Design)
- Protection should not rely on secrecy of the protection mechanism itself
- Use fail-safe defaults
- Deny access by default and only grant access with explicit permission
- Design security in from the start
- The Trusted Computing Base (TCB)
- TOCTTOU (Time-of-check to time-of-use) Vulnerabilities
- Phycological Acceptability
- Impact to users should be minimal
↗ Institutes & Organizations in IT ↗ Laws & Regulations in Electronic & Information Fields ↗ Risk Management
Security vs. Compliance
- Compliance = meet ISO requirements, pass audits, gain certification.
- Security = reduce real risks, adapt toevolving threats.
- Compliance gives a baseline; security demands continuous improvement.
- Compliance is auditor-focused; security is attacker-focused.
- Being compliant ≠ being secure — but together they strengthen trust & resilience.
ISO/IEC 27001
- What: Widely adopted global standard for ISMS (Information Security Management Systems); thousands of orgs certified, often a market expectation.
- How: Define scope → assess risks → choose controls; document choices in a Statement of Applicability (SoA).
- Controls: Annex A (2022) = 93 controls across 4 themes (Organizational, People, Physical, Technological).
- Certification: 3-year cycle with annual audits; often paired with ISO 27002 / 27005 / 27017 /27018
ISO/IEC 31000
- What: Globally recognized standard for risk management; widely used across industries and governments.
- How: Provides principles, framework, and process to identify, assess, treat, and monitor risks (not certifiable, but adaptable).
- Focus: Integration of risk management into governance, strategy, and operations; promotes a structured and consistent approach.
- Popularity: Adopted worldwide as a baseline for enterprise risk management (ERM) and often mapped to other frameworks (e.g., COSO ERM, ISO 27005).
Other standards • ISO/IEC 27017 — Guidelines for cloud security. • ISO/IEC 27018 — Protection of personal data in the cloud. • ISO/IEC 27005 — Risk management method aligned with ISO 31000. • ISO/IEC 27701 — Extension of 27001 for privacy information management (PIMS). • ISO/IEC 22301 — Business continuity management systems. • IEC 62443 — Cybersecurity for industrial automation & control systems (OT/ICS). • ETSI EN 303 645 — Baseline security for consumer IoT devices. • NIST Cybersecurity Framework (CSF) — Widely used US framework, global influence. • NIST SP 800-53— Comprehensive security and privacy controls catalog. • PCI DSS — Payment Card Industry Data Security Standard, mandatory in payments. • SOC 2 (AICPA) — Service provider assurance reports on security, availability, etc. • Common Criteria (ISO/IEC 15408) — International IT product evaluation standard. • ISACA COBIT 2019 — Global IT governance & management framework aligning IT with business goals (successor to COBIT 5).
TBD..

