Unit 1: Introduction to Information Security

McCumber Cube β€’ IS Components β€’ SDLC vs SecSDLC β€’ Communities of Interest β€’ Top-down vs Bottom-up

⚑ 2-Mark Q&A
1. What are the components of an information system? HOT
An information system consists of:
  • People – users, managers, administrators, developers
  • Hardware – physical devices like servers, computers, routers
  • Software – applications and operating systems
  • Data – raw facts and processed information
  • Procedures – rules and instructions for operating the system
  • Networks – communication channels connecting devices
2. Draw / Describe the McCumber Cube. HOT
The McCumber Cube is a 3D security framework with three dimensions:
  • Information States: Storage, Transmission, Processing
  • Security Goals (CIA): Confidentiality, Integrity, Availability
  • Security Safeguards: Technology, Policy & Practice, Human Factors
Each cell (3Γ—3Γ—3 = 27 cells) represents a security consideration to be addressed.
3. Write down the four important functions of Information Security. IMP
  • Protect – Safeguard information and systems from attacks
  • Detect – Identify when a security breach has occurred
  • Respond – React appropriately to a detected incident
  • Recover – Restore normal operations after an incident
4. Differentiate top-down vs bottom-up approach to IS implementation. HOT
Top-Down ApproachBottom-Up Approach
Initiated by top managementInitiated by technical/IT staff
Policies and budgets from leadersLacks full management support
More effective and structuredOften inconsistent and less successful
Considered superiorConsidered inferior
5. Why is top-down approach considered superior? IMP
Top-down approach is superior because:
  • Management provides strong support, authority, and funding
  • Security policies are enforced across the entire organization
  • Goals align with business objectives
  • Ensures compliance from all employees including IT staff
6. Why is information security a management problem?
IS is a management problem because it involves policies, responsibilities, budgets, and culture β€” which only management can control. Management can:
  • Provide resources and funding
  • Enforce security policies organization-wide
  • Approve training programs
  • Ensure employee discipline
Technology alone cannot address these organizational aspects.
7. List the responsibilities of Chief Information Officer (CIO).
  • Oversee IT infrastructure and systems
  • Align IT strategy with business goals
  • Manage IT budgets and resources
  • Ensure data management and security policies
  • Lead digital transformation initiatives
8. Differentiate law and ethics. IMP
  • Law – Rules created and enforced by the government. Breaking a law results in legal punishment.
  • Ethics – Moral principles that guide behaviour. Not legally punishable but defines what is right or wrong.
Ethics goes beyond law β€” something may be legal but unethical (e.g., spying on employees without notice).
9. What are the multiple layers of security an organization should have? IMP
  1. Physical Security Layer
  2. Network Security Layer
  3. System/Endpoint Security Layer
  4. Application Security Layer
  5. Data Security Layer
  6. User (Human) Security Layer
Each layer protects the next inner layer β€” defense in depth.
10. Name some important functions of IS for an organization.
  • Protect confidential data from unauthorized access
  • Ensure business continuity during disruptions
  • Comply with legal and regulatory requirements
  • Safeguard organizational reputation
  • Detect and respond to security incidents
πŸ“ 8-Mark Topics
McCumber Cube & Components of an Information System VERY IMP

McCumber Cube β€” developed by John McCumber β€” is a 3D security framework showing that IS involves people, technology, and procedures protecting data in every state.

+------------------+ / Confidentiality /| / Integrity / | / Availability / | +------------------+ | | | | | Storage | / | Transmission | / Policy & Practice | Processing | / Human Factors +------------------+/ Technology

Dimension 1 β€” Information States:

  • Storage – Data at rest in hard disks, databases
  • Transmission – Data moving across network (email, file transfer)
  • Processing – Data being used by applications

Dimension 2 β€” Security Goals (CIA Triad):

  • Confidentiality – Only authorized users can access data
  • Integrity – Data is accurate and not tampered with
  • Availability – Data and systems are accessible when needed

Dimension 3 β€” Security Safeguards:

  • Technology – Firewalls, encryption, antivirus, authentication tools
  • Policy & Practice – Rules, procedures, acceptable use policies
  • Human Factors – Training, awareness, access control behaviour

Components of an Information System:

ComponentDescriptionSecurity Concern
PeopleUsers, managers, admins, developersInsider threats, social engineering
HardwareServers, computers, routers, storagePhysical theft, hardware failure
SoftwareOS, applications, utilitiesMalware, vulnerabilities, patches
DataRaw facts, processed informationUnauthorized access, corruption
ProceduresPolicies and operational rulesWeak policies, non-compliance
NetworksCommunication channelsEavesdropping, DoS, intrusion

Conclusion: The McCumber Cube ensures that security covers all three dimensions β€” all 27 cells must be addressed for complete protection.

SDLC vs SecSDLC β€” Phases Comparison VERY IMP

SDLC (Systems Development Life Cycle) is the traditional model for developing software. SecSDLC integrates security into every phase.

SDLC PhaseSecSDLC PhaseSecurity Addition
InvestigationInvestigationSecurity feasibility, threats identified
AnalysisAnalysisThreat modeling, risk assessment
Logical DesignLogical DesignSecurity controls selected (auth, encryption, firewall)
Physical DesignPhysical DesignSpecific security products/technologies chosen
ImplementationImplementationSecurity testing, employee security training
MaintenanceMaintenanceContinuous monitoring, patches, audits

Waterfall SDLC: Linear, sequential model β€” Requirements β†’ Design β†’ Coding β†’ Testing β†’ Deployment β†’ Maintenance.

Key Difference: SecSDLC treats security as a core requirement from day one, not an afterthought. Security is designed-in, not bolted-on.

Conclusion: Organizations must use SecSDLC to ensure security is built into systems at every stage of development.

Communities of Interest in Information Security IMP

A community of interest is a group of people who work together to protect an organization's information and systems. Three major communities:

CommunityResponsibilitiesFocus
Information Security CommunityProtect CIA, develop policies & standards, manage firewalls, encryption, monitoringSecurity expertise
IT CommunityProvide technical infrastructure, maintain networks/servers/apps, implement security toolsTechnology support
Management CommunityProvide leadership, funding & resources, approve policies, set security prioritiesGovernance & direction

Why collaboration is essential: If they act separately, the security program becomes fragmented and weak. When they collaborate:

  • Management provides authority and budget
  • IT provides technical implementation
  • InfoSec provides expertise and strategy

Together they achieve a strong, balanced, and complete security program.

Categorizing IS Components & Critical Characteristics of Information

Critical Characteristics of Information (C.I.A + A.A.A):

CharacteristicMeaningImpact if violated
ConfidentialityOnly authorized access to dataData breach, privacy violation
IntegrityData is accurate and unmodifiedWrong decisions, fraud
AvailabilityData accessible when neededBusiness disruption, loss of service
AuthenticityData is genuine, from trusted sourceImpersonation, fraud
AccuracyData is correct and error-freeIncorrect processing
UtilityData is in a usable formatUnusable encrypted data without key
PossessionOwner has control of the dataRansomware, unauthorized copy

Each characteristic must be maintained across all three information states (Storage, Transmission, Processing) to ensure complete security of the information system.

Unit 2: Security Threats & Attacks

Types of Threats β€’ Attack Types β€’ Malware β€’ Worms vs Viruses β€’ Trojans

⚑ 2-Mark Q&A
1. Differentiate direct and indirect attacks. IMP
  • Direct Attack: The attacker interacts directly with the target system (e.g., password cracking, port scanning, SQL injection).
  • Indirect Attack: The attacker uses a third-party device or compromised computer to launch attacks (e.g., botnets, zombie computers).
2. List the categories of threats. HOT
  • Human threats – intentional or accidental actions by people
  • Technical threats – software bugs, malware, system crashes
  • Natural threats – floods, fire, earthquakes, storms
  • Environmental/Physical threats – theft, vandalism, power failures
  • Internal and external threats – insiders vs outsiders
  • Operational threats – process failures, poor data handling
3. Give a scenario to explain a man-in-the-middle attack. IMP
Scenario: You connect to public Wi-Fi in a cafΓ©. An attacker creates a fake Wi-Fi network with a similar name. When you connect, the attacker secretly sits between you and the real server. He can read your messages, passwords, and data without your knowledge. This is a Man-in-the-Middle (MitM) attack.
4. Define attack. Describe the major types of attacks. HOT
Attack: An attempt to exploit a vulnerability to cause harm to an information system.

Types:
  • Passive Attacks – Eavesdropping, traffic analysis (no modification)
  • Active Attacks – Masquerade, replay, modification, DoS
  • Close-in Attacks – Physical proximity β€” shoulder surfing, dumpster diving
  • Insider Attacks – By employees or trusted insiders
5. Outline the difference between attack and vulnerability. IMP
  • Vulnerability – A weakness in a system (e.g., unpatched software, weak password)
  • Attack – An actual attempt to exploit that vulnerability (e.g., brute force on weak password)
A vulnerability is a condition; an attack is an action.
6. Compare worms and viruses. Do Trojans carry viruses or worms? IMP
VirusWorm
Needs a host file to spreadSpreads on its own through networks
Requires user action to executeSelf-replicates without user action
Attaches to executable filesExploits network vulnerabilities
Trojans: Yes β€” a Trojan horse can act as a carrier delivering viruses, worms, or any malicious payload into a system. It looks legitimate but carries a hidden threat.
7. Summarize major types of attacks and means to avoid them.
Attacks: DoS, Malware, Unauthorized access, Data interception, Social engineering
Prevention:
  • Strong passwords and MFA
  • Firewalls and IDS/IPS
  • Updated antivirus and patches
  • Access controls and least privilege
  • Employee security awareness training
8. Why do employees constitute one of the greatest threats to IS? IMP
Employees have direct access to systems and data. They can cause harm through:
  • Weak passwords or password sharing
  • Clicking phishing links (unintentional)
  • Careless handling of sensitive data
  • Intentional misuse by disgruntled employees
  • Shoulder surfing vulnerabilities
Protection against shoulder surfing: tilt screen, use privacy filters, be aware of surroundings.
9. What are the different categories of threat? Give examples.
CategoryExamples
HumanHackers, disgruntled employees, social engineering
TechnicalMalware, ransomware, software bugs
NaturalFloods, fire, earthquakes
PhysicalDevice theft, vandalism, power failure
ExternalCyber attackers, competitors, terrorists
10. Why do networking components need more security examination?
Networking components connect internal systems to the outside world. They need more examination because:
  • They are exposed to public networks constantly
  • They handle critical data flow across the organization
  • A single network weakness can compromise the entire organization
  • They are common targets for DoS, eavesdropping, and intrusion
πŸ“ 8-Mark Topics
Types of Threats Faced by an Organization VERY IMP

A threat is any event, action, or situation that can cause damage, loss, or unauthorized access to information or systems.

Threat TypeDescriptionExamples
Human ThreatsCaused by people β€” intentionally or accidentallyHackers, disgruntled employees, social engineering, phishing, user errors
Technical ThreatsCaused by technology failures or malicious softwareMalware, ransomware, software bugs, system crashes, network failures
Natural ThreatsEnvironmental hazards beyond human controlFloods, fire, earthquakes, lightning, storms
Physical ThreatsDamage to hardware and physical facilitiesTheft of devices, vandalism, power failures, hardware destruction
Operational ThreatsAffect day-to-day business operationsProcess failures, incorrect data handling, poor system management
External ThreatsThreats from outside the organizationCompetitors, cyber attackers, terrorist attacks

How to handle:

  • Identify assets β†’ identify threats β†’ assess likelihood and impact
  • Apply appropriate controls for each threat type
  • Prioritize high-likelihood, high-impact threats

Conclusion: Understanding each threat group helps organizations plan proper security controls and reduce risks effectively.

Types of Malware β€” Worms vs Viruses vs Trojans VERY IMP
Malware TypeDescriptionSpread Method
VirusAttaches to files; runs when file is executedHost file execution, file sharing
WormSelf-replicates automatically across networksNetwork vulnerabilities, no user action needed
Trojan HorseAppears legitimate but carries malicious payloadDownloads, email attachments, fake software
SpywareSecretly collects user informationBundled with software, browser exploits
AdwareDisplays unwanted advertisementsFree software bundles
RansomwareEncrypts data and demands payment for keyPhishing emails, drive-by downloads
RootkitsHides malicious processes from detectionExploiting admin privileges
KeyloggersRecords all keystrokes β€” captures passwordsTrojans, physical installation

Worms vs Viruses β€” Key Differences:

  • A virus needs a host file and user action to spread
  • A worm spreads on its own through network vulnerabilities β€” no user action needed
  • Worms typically cause more widespread damage faster

Do Trojans carry viruses or worms?
Yes. A Trojan horse acts as a carrier program that can deliver viruses, worms, or any other malicious payload into a system once trusted and executed by the user.

Detailed Analysis of Attack Types IMP

1. Passive Attacks β€” Observer only, no modification:

  • Eavesdropping – Capturing data transmitted over a network (packet sniffing)
  • Traffic Analysis – Analyzing communication patterns even when data is encrypted

Hard to detect but easy to prevent with encryption.

2. Active Attacks β€” Modifies data or system:

  • Masquerade – Pretending to be an authorized user using stolen credentials
  • Replay – Capturing and retransmitting valid messages to gain access
  • Message Modification – Altering, delaying, or reordering messages
  • Denial of Service (DoS) – Overwhelming a system to deny legitimate users access

Easy to detect but hard to prevent entirely.

3. Close-in Attacks β€” Physical proximity required:

  • Shoulder Surfing – Watching user type passwords or PINs
  • Dumpster Diving – Searching discarded materials for sensitive info
  • Eavesdropping – Listening to conversations in proximity

4. Insider Attacks β€” From within the organization:

  • Disgruntled employees stealing or destroying data
  • Careless employees accidentally exposing data
  • Authorized users misusing their access privileges

5. Password Attacks: Brute force, dictionary attacks, rainbow tables, credential stuffing.

Prevention: Strong passwords, MFA, encryption, access controls, employee training, monitoring.

Analyse Threat, Threat Agent, Vulnerability, Risk, Attack & Exploit on a Personal Computer VERY IMP

Example Scenario: Information stored on your personal computer: photos, college documents, passwords saved in browser, project files, login details.

TermDefinitionExample (Personal PC)
ThreatPotential event that can cause harmUnauthorized access or data theft
Threat AgentEntity that carries out the threatA hacker, malware, or someone using your PC without permission
VulnerabilityWeakness that can be exploitedWeak password, outdated antivirus, unsecured Wi-Fi
ExposureCondition of being open to damageIf someone logs into your PC, personal files and accounts can be misused
RiskLikelihood Γ— Impact of a threatLoss of personal information, identity theft, financial loss
AttackActual attempt to exploit the vulnerabilityMalware infection, phishing attempt, brute-force password attack
ExploitSpecific technique used in the attackUsing a browser vulnerability or Wi-Fi weakness to enter the system

Conclusion: Every information system has these risk components. Identifying them systematically helps prioritize protection measures.

Security Threats β€” Statement Discussion: "80% are Internal"

"Information security is a major concern for the software industry today as the number of internal threats is nearly 80%"

Why internal threats dominate:

  • Employees have legitimate access to systems β€” easy to misuse
  • They know the internal network layout and data locations
  • Their activities may not be as closely monitored as outsiders
  • Disgruntled employees may intentionally cause harm
  • Accidents and negligence are common internal threats

Types of internal threats:

  • Data theft by employees leaving the organization
  • Misconfiguration of systems by IT staff
  • Falling victim to phishing (unintentional insider)
  • Sharing login credentials with colleagues

Controls to address internal threats:

  • Principle of least privilege β€” give minimum access needed
  • Separation of duties β€” no single person controls critical processes
  • Employee monitoring and audit logs
  • Security awareness training (SETA program)
  • Background verification before hiring
  • Revoking access immediately when employee leaves

Unit 3: Risk Management

Risk Identification β€’ Risk Control Strategies β€’ CBA β€’ SLE β€’ Asset Valuation β€’ Intellectual Property

⚑ 2-Mark Q&A
1. What are the major stages of Risk Assessment? HOT
  1. Identify assets
  2. Identify threats and vulnerabilities
  3. Analyze likelihood and impact
  4. Calculate and evaluate risk
2. List down the components of risk management. HOT
  1. Risk Identification – Finding assets, threats, and vulnerabilities
  2. Risk Assessment – Analyzing likelihood and impact
  3. Risk Control – Choosing strategies to reduce or handle risk
  4. Risk Monitoring – Continuously checking if risks change
3. How do you calculate Single Loss Expectancy (SLE)? HOT
SLE = Asset Value (AV) Γ— Exposure Factor (EF) AV = monetary value of the asset EF = percentage of asset lost in one incident (0 to 1) Example: AV = β‚Ή10,00,000 | EF = 0.30 SLE = 10,00,000 Γ— 0.30 = β‚Ή3,00,000
SLE represents the expected financial loss from a single occurrence of a risk event.
4. What is Cost-Benefit Analysis (CBA)? IMP
CBA determines whether the cost of implementing a security control is worth the protection it provides. If the benefit exceeds the cost, the control is justified.
CBA = ALE(before) – ALE(after) – Cost of Control ALE = Annual Loss Expectancy = SLE Γ— ARO ARO = Annualized Rate of Occurrence
5. How to identify and prioritize threats? IMP
Identify threats by analyzing:
  • Assets β€” what needs protection
  • Vulnerabilities β€” existing weaknesses
  • Existing controls β€” what is already protected
  • Possible attackers β€” who might attack
Prioritize based on:
  • Likelihood of occurring
  • Impact or damage if it occurs
  • Cost of prevention
6. Who is responsible for risk management in an organization? IMP
Risk management is the responsibility of the entire organization, but:
  • Top Management – Approves risk strategies, provides funding
  • InfoSec Team – Identifies risks, suggests controls (usually takes the lead)
  • IT Department – Implements technical solutions
  • Users/Employees – Follow security practices
The Information Security Community usually leads because they have expertise in threats, vulnerabilities, and controls.
7. What are vulnerabilities? How do you identify them?
A vulnerability is a weakness in a system that can be exploited by an attacker.
Identified through:
  • Vulnerability scanning tools (Nessus, OpenVAS)
  • Security audits and reviews
  • Penetration testing
  • Reviewing system configurations
8. What is Intellectual Property (IP)? Is it protected the same worldwide?
IP refers to creations of the mind: software, books, music, designs, inventions, trademarks.
No, IP protection varies by country. Key laws:
  • USA: Copyright Act, Patent Act, Lanham Act, DMCA
  • Europe: EU Copyright Directive, European Patent Convention, GDPR
9. What is meant by Cost Benefit Analysis? State the rules followed while designing policy.
CBA compares the cost of a control versus the benefit (reduced risk). Rules for policy design:
  • Policy must be achievable and realistic
  • Must be communicated to all employees
  • Must be enforceable with consequences
  • Must be reviewed and updated regularly
  • Must have management support
10. Tabulate the components of risk management.
ComponentActivity
Risk IdentificationList assets, threats, vulnerabilities
Risk AssessmentCalculate likelihood Γ— impact = risk level
Risk ControlSelect avoidance, mitigation, transfer, acceptance, deterrence
Risk MonitoringContinuously review and update risk status
πŸ“ 8-Mark Topics
Risk Identification Components VERY IMP

Risk identification involves understanding all possible risks to an organization's assets.

ComponentDescription
1. Asset IdentificationList all hardware, software, data, people, and processes that have value
2. Threat IdentificationFind all possible events that may harm the asset (human, natural, technical)
3. Vulnerability IdentificationDetect weaknesses in systems, processes, and people that threats can exploit
4. Control AnalysisCheck what security measures are already in place and their effectiveness
5. Risk AssessmentCombine threats + vulnerabilities + asset values to determine overall risk level
6. DocumentationRecord all findings for management decision-making and audit purposes

Risk Calculation:

Risk = Likelihood Γ— Impact SLE = AV Γ— EF ALE = SLE Γ— ARO CBA = ALE(before) - ALE(after) - Annual Cost of Control

Outcome: Prioritized list of risks that need to be controlled, based on their level of impact and likelihood of occurrence.

Five Risk Control Strategies with Decision Points VERY IMP
StrategyDescriptionExampleDecision Point
1. AvoidanceStop or eliminate the risky activity completelyDisabling a vulnerable service; not using a risky applicationWhen risk is too high and alternatives exist
2. MitigationReduce the impact or likelihood of the riskFirewalls, antivirus, backups, patches, trainingWhen risk cannot be avoided but can be reduced
3. TransferenceShift responsibility to a third partyCyber insurance, outsourcing security operationsWhen specialized external support is cheaper or safer
4. AcceptanceAccept the risk when cost of protection exceeds impactIgnoring very low-risk, low-probability threatsWhen impact is minimal and cost of control is too high
5. DeterrenceDiscourage attackers through obstacles or warningsCCTV cameras, legal notices, warning banners, strict policiesWhen goal is to reduce motivation of attackers
Exam Tip: Remember as A-M-T-A-D β€” Avoidance, Mitigation, Transference, Acceptance, Deterrence. PDCA + these 5 strategies = complete risk management answer.
Cost-Benefit Analysis β€” Items Affecting Cost of Control VERY IMP

Cost-Benefit Analysis (CBA) determines whether implementing a security control is financially justified.

If ALE(before) - ALE(after) > Annual Cost of Control Then Control is JUSTIFIED (benefit > cost) Else Control is NOT cost-effective

Items affecting the COST of a control:

#Cost ItemDescription
1Purchase CostHardware, software, and tools needed for the control
2Installation CostLabour, configuration, and testing expenses
3Training CostTeaching employees to use or manage the system
4Maintenance CostUpgrades, patching, repairs, licensing fees
5Operational CostPower consumption, manpower, continuous monitoring
6Cost of Loss Without ControlData loss, downtime, legal penalties if control not implemented

Conclusion: CBA ensures smart, justified use of the organization's security budget. Not every risk needs maximum investment.

Asset Value Parameters & International IS Laws

Parameters to calculate asset value:

ParameterDescription
Confidentiality ValueHow sensitive the information is β€” cost if exposed
Integrity ValueHow important accuracy is β€” cost if tampered
Availability ValueHow critical for daily operations β€” cost of downtime
Replacement CostCost to replace hardware or recover lost data
Legal/Regulatory ImpactPenalties and fines if data is breached
Business ImpactLoss of customers, reputation damage, operational downtime
Recovery CostTime and money needed to restore the system

International Laws relating to Privacy and IS:

Law/StandardRegionFocus
GDPREuropePrivacy rights and data protection
OECD GuidelinesGlobalPrivacy principles for data collection
Council of Europe Convention 108EuropeFirst international treaty on data protection
ISO/IEC 27001GlobalISMS β€” Information Security Management System
HIPAAUSAProtection of health-related personal data
Privacy Shield FrameworkUS–EUControls data transfer between US and Europe

Unit 4: Security Policies & Standards

NIST SP 800-14 β€’ ISO 27000 β€’ PDCA Cycle β€’ BS7799 β€’ Contingency Planning β€’ BCP

⚑ 2-Mark Q&A
1. Outline the Plan-Do-Check-Act (PDCA) cycle described in ISO 27000 series. HOT
  • Plan – Identify problems, set security goals, create policies and procedures
  • Do – Implement security controls and procedures
  • Check – Audit and monitor performance and results
  • Act – Improve the system based on audit findings and repeat
PDCA ensures continuous improvement of the information security management system.
2. What do you mean by crisis management? IMP
Crisis management is the process of handling events that threaten the organization's reputation, operations, or safety. It includes:
  • Communication with employees, public, and media
  • Activating emergency response plans
  • Stabilizing operations during and after the crisis
3. What is contingency planning? How is it different from routine management planning? IMP
Contingency planning prepares an organization to respond to unexpected disruptions (disasters, major incidents). It includes disaster recovery plans and business continuity plans.

Difference from routine planning:
  • Routine planning handles normal, day-to-day operations
  • Contingency planning handles abnormal, crisis situations
  • Contingency plans are activated only when routine plans fail
4. Mention the precepts of incident response that apply to disaster recovery. IMP
  1. Preparation first – Plans, procedures, and training must be ready before incidents occur
  2. Contain the damage – Stop the incident from spreading to other systems
  3. Recover quickly – Restore services as fast as possible
  4. Learn from the incident – Update plans to prevent future recurrence
5. State the rules followed while designing a policy. IMP
A policy is effective and legally enforceable when it:
  • Is written in clear, unambiguous language
  • Has management approval and support
  • Is communicated to all relevant employees
  • Is achievable and realistic
  • Is enforceable with defined consequences for non-compliance
  • Is reviewed and updated regularly
6. Indicate the significance of a security perimeter.
A security perimeter is a boundary that defines the area to be secured. Its significance:
  • Controls who and what enters/exits the secure zone
  • Reduces unauthorized physical and network access
  • Layers perimeters (outer fence β†’ building β†’ server room) for defense-in-depth
7. Compare ISO 17700 with NIST security model. IMP
AspectISO 17799/27001NIST SP 800-14
OriginInternational (British Standard BS7799)USA (National Institute of Standards)
FocusInformation Security Management System (ISMS)Principles for securing IT systems
StructurePlan-Do-Check-Act cycle; 14 control domains14 guiding principles for security
CertificationOrganizations can be ISO 27001 certifiedNo formal certification; advisory only
8. Illustrate the criteria for a policy to be effective and legally enforceable.
For a policy to be legally enforceable:
  • Dissemination – Policy must be distributed to all employees
  • Review – Employees must have read and understood it
  • Comprehension – Must be written in understandable language
  • Compliance – Employees must acknowledge and agree to comply
  • Uniform Enforcement – Applied consistently to everyone
9. Summarize SETA (Security, Education, Training, Awareness) and its elements.
SETA is a program to reduce security mistakes by educating people:
  • Security Education – In-depth knowledge for security professionals (degree, certification)
  • Security Training – Skills to perform specific security tasks (hands-on)
  • Security Awareness – General knowledge for all employees (posters, emails, briefings)
Goal: Ensure all employees understand their security responsibilities.
10. What is Business Continuity Planning (BCP)? Elements?
BCP ensures critical operations continue during and after a disaster.
  • Business Impact Analysis (BIA) – Identify critical functions and their dependencies
  • Recovery Time Objective (RTO) – Maximum acceptable downtime
  • Recovery Point Objective (RPO) – Maximum acceptable data loss
  • Disaster Recovery Plan (DRP) – Steps to restore IT systems
  • Testing – Regular drills and simulations
πŸ“ 8-Mark Topics
NIST SP 800-14 β€” 14 Principles for Securing IT Systems VERY IMP

NIST Special Publication 800-14 provides 14 key principles for building secure IT systems:

#PrincipleMeaning
1Security supports missionSecurity exists to enable business goals, not obstruct them
2Part of the system life cycleSecurity must be built in from day one, not added later
3Cost-effectiveSecurity controls should be proportional to the risk they address
4Responsibilities must be explicitEveryone must know their security role and accountability
5Responsibilities sharedSecurity is everyone's job β€” not just IT
6Security should be enforcedPolicies must be enforced consistently β€” not optional
7Review security periodicallyRegular audits and reviews to stay current with threats
8Least privilegeGive users only the minimum access needed for their job
9Fail-safe defaultsDefault state should be denial of access β€” not open
10Simple mechanismsComplex systems are harder to secure; keep it simple
11Open designSecurity should not rely on secrecy of design (no security by obscurity)
12Holistic securitySecurity must cover people, processes, and technology together
13Consider future needsDesign systems that can adapt to future security requirements
14Environmental awarenessBe aware of physical and operational environment changes
Exam Tip: The most frequently asked are principles 2, 4, 7, 8, 9, and 12. Know the principle name + one line explanation.
PDCA Cycle (ISO 27000) & IDPS Detection Methods VERY IMP

PDCA (Plan-Do-Check-Act) Cycle β€” describes continuous improvement of the ISMS:

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”‚ PDCA Cycle (ISO 27000) β”‚ β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜ PLAN ──→ DO ──→ CHECK ──→ ACT ──→ (back to PLAN) PLAN: Identify risks, set objectives, create policies DO: Implement controls and procedures CHECK: Monitor, audit, measure effectiveness ACT: Take corrective actions, improve system

IDPS Detection Methods:

MethodHow it worksStrength
Signature-BasedCompares traffic against database of known attack signaturesHighly accurate for known attacks
Anomaly-BasedDetects deviation from established baseline of normal behaviourCan detect unknown/new attacks
Stateful Protocol AnalysisChecks whether protocols behave according to RFC standardsDetects protocol abuse
Heuristic DetectionUses rules and AI to identify suspicious activitiesAdaptive, catches new threats

These methods analyze packets, logs, and patterns continuously to detect threats in real time.

BS7799:2 Security Standards & Contingency Planning IMP

BS7799 / ISO 27001 β€” Information Security Management System standard:

Major Process Steps for Implementation:

StepActivity
1. Scope DefinitionDefine what the ISMS will cover β€” systems, locations, departments
2. Risk AssessmentIdentify assets, threats, vulnerabilities; calculate risk level
3. Control SelectionChoose controls from Annex A (114 controls across 14 domains)
4. Statement of ApplicabilityDocument which controls apply and why
5. ISMS ImplementationDeploy controls, train staff, document procedures
6. Internal AuditVerify controls are working correctly
7. Management ReviewTop management reviews ISMS performance
8. Certification AuditExternal auditor verifies compliance for ISO 27001 certification

Contingency Planning Components:

  • Business Impact Analysis (BIA) – Identify critical functions and recovery priorities
  • Incident Response Plan (IRP) – Steps to handle security incidents
  • Disaster Recovery Plan (DRP) – IT system restoration procedures
  • Business Continuity Plan (BCP) – Keep business running during/after disaster
Classify Occurrences as Incident or Disaster + BCP Activation VERY IMP

Incident: An event that disrupts normal operations but can be handled with existing resources.
Disaster: A severe disruption that requires activation of the Business Continuity Plan.

ScenarioClassificationBCP Needed?Law Enforcement?
Hacker gets into network and deletes files from a serverIncidentMaybe (if critical systems affected)Yes
Fire in storeroom β€” some computers damaged, contained quicklyDisasterYes β€” equipment damagedMaybe (investigate cause)
Tornado hits power company β€” no power for 3–5 daysDisasterYes β€” extended outageNo
Employees strike β€” critical workers absent for weeksDisasterYes β€” alternate staffing neededNo
Disgruntled employee steals critical server after hoursDisasterYes β€” critical equipment lostYes β€” theft occurred

Steps to restore operations:

  • Activate DRP/BCP immediately
  • Assess scope of damage
  • Restore from backups
  • Switch to alternate/recovery site if needed
  • Involve law enforcement for criminal acts
  • Document the incident for future prevention

Unit 5: Physical Security & Personnel

Physical Controls β€’ IDPS Deployment β€’ Scanning Tools β€’ CISO β€’ Hiring Process β€’ Access Control

⚑ 2-Mark Q&A
1. Define Demilitarized Zone (DMZ). HOT
A DMZ is a separate, isolated network segment placed between an organization's internal network and the internet. It hosts public-facing services (web servers, mail servers, DNS) to protect internal systems from direct internet exposure.
Internet ──→ [ Firewall 1 ] ──→ [ DMZ: Web/Mail Servers ] ──→ [ Firewall 2 ] ──→ Internal Network
2. How does a Mantrap work? IMP
A mantrap is a small enclosure with two interlocking doors. Only one door can open at a time. A person must be authenticated (biometrics/keycard) at the first door before the second door opens. It prevents tailgating (unauthorized entry by following an authorized person).
3. Distinguish between False Reject Rate (FRR) and False Accept Rate (FAR). IMP
  • False Reject Rate (FRR): A legitimate, authorized user is wrongly rejected by the biometric system. (Type I Error)
  • False Accept Rate (FAR): An unauthorized user is wrongly accepted by the biometric system. (Type II Error)
The Crossover Error Rate (CER) is the point where FRR = FAR β€” a lower CER means better accuracy.
4. Outline the roles of Chief Information Security Officer (CISO). HOT
  • Develop and enforce information security policies
  • Lead the information security team
  • Manage risk assessment and mitigation programs
  • Ensure compliance with laws, standards, and regulations
  • Oversee incident detection and response
  • Report security posture and status to top management
5. What are the tasks that should be done when an employee leaves an organization? HOT
  • Revoke all system access rights immediately
  • Collect ID cards, laptops, and company devices
  • Disable user accounts and email
  • Conduct an exit interview
  • Remove physical access (gate pass, biometrics, key fobs)
  • Ensure signed non-disclosure agreements are on file
6. Differentiate Discretionary and Non-Discretionary Access Control. IMP
DAC (Discretionary)NDAC (Non-Discretionary)
Resource owners decide accessAccess assigned by central authority based on rules/roles
Flexible but less secureMore secure, centrally controlled
User can grant access to othersUsers cannot change access settings
Example: File permissions in WindowsExample: RBAC in enterprise systems
7. Identify the need for Intrusion Detection Systems (IDS). IMP
IDS is needed to:
  • Monitor network traffic and system activity continuously
  • Detect unauthorized access and suspicious behaviour
  • Alert administrators before significant damage occurs
  • Provide audit trails for forensic investigation
  • Complement firewalls (IDS detects what firewalls miss)
8. Write four physical security controls used in the real world.
  1. CCTV cameras – Monitor and record all entry/exit activity
  2. Biometric scanners – Fingerprint/retinal scan for access control
  3. Mantraps – Prevent tailgating at secure entrances
  4. Security guards – Human presence to deter and respond to threats
9. Differentiate honeypot and honeynet.
  • Honeypot – A single decoy system designed to attract and trap attackers. Used to study attack methods.
  • Honeynet – A network of multiple honeypots creating a realistic decoy environment to observe sophisticated attack techniques.
Both are used for threat intelligence and early warning β€” not for production use.
10. Compare TCP and UDP packet.
TCPUDP
Connection-oriented (3-way handshake)Connectionless β€” no handshake
Reliable, ordered deliveryNo guarantee of delivery or order
Error checking and acknowledgementMinimal error checking
Slower but reliableFaster but unreliable
HTTP, HTTPS, FTP, EmailDNS, VoIP, Video streaming, Gaming
A typical transaction may use both β€” e.g., DNS (UDP for query, TCP for zone transfers).
πŸ“ 8-Mark Topics
IDPS Deployment & Implementation VERY IMP

Intrusion Detection and Prevention Systems (IDPS) detect and respond to security threats on networks and hosts.

Types of IDPS:

  • NIDS – Network-based IDS: monitors network traffic at strategic points
  • HIDS – Host-based IDS: monitors activity on individual hosts/servers
  • IPS – Inline prevention: can actively block threats

Deployment Steps:

StepActivity
1. PlanningIdentify network size, traffic volume, threat landscape, placement locations
2. Type SelectionChoose NIDS/HIDS/IPS and detection method (signature/anomaly)
3. Deployment LocationsNetwork perimeter, inside critical segments, near firewalls/routers, on important servers
4. ConfigurationDefine rules, signatures, alert thresholds, response actions
5. IntegrationConnect IDPS with SIEM, firewalls, log management servers
6. TestingSimulate attacks to verify detection accuracy and reduce false positives
7. Monitoring24/7 monitoring, alert review, incident response triggers
8. MaintenanceRegular signature updates, policy tuning, periodic audits

Placement diagram:

Internet ──→ [Firewall] ──→ [NIDS sensor] ──→ DMZ ──→ [NIDS sensor] ──→ Internal LAN HIDS on: Web Server, DB Server, File Server
Scanning & Analysis Tools β€” Functions and Types VERY IMP

Scanning and analysis tools help security professionals identify vulnerabilities and gather attacker information.

Functions:

  • Detect open ports and running services
  • Identify software versions and patch levels
  • Find known vulnerabilities in systems
  • Monitor network traffic for anomalies
  • Analyze logs for suspicious activity
  • Track attacker behaviour for forensics
Tool TypeExamplePurpose
Port ScannersNmapFind open ports and running services on target systems
Vulnerability ScannersNessus, OpenVASIdentify known security weaknesses in systems
Network Sniffers / Packet AnalyzersWiresharkCapture and analyze network packets in real time
Log AnalyzersSplunk, ELK StackParse and search logs for suspicious patterns
Password Auditing ToolsJohn the Ripper, HashcatTest password strength; check for weak/cracked passwords
Malware Analysis ToolsCuckoo SandboxSafely execute and analyze malware behaviour
Protocol AnalyzersWireshark, tcpdumpExamine protocol behaviour for abnormalities

How they integrate into proactive security: These tools are run regularly in authorized vulnerability assessments, combined with IDPS for real-time monitoring, and results feed into the risk management process.

Security Architecture & Spheres of Security VERY IMP

Security Architecture is the overall framework for securing systems. It includes:

  • Security policies and standards
  • Access control mechanisms
  • Network layout and segmentation
  • Hardware/software security controls
  • Monitoring and incident response

Spheres of Security show how information is protected at different concentric layers:

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”‚ 6. External World / Internet β”‚ β”‚ β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”‚ β”‚ β”‚ 5. Environment / Buildingβ”‚ β”‚ β”‚ β”‚ β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”‚ β”‚ β”‚ β”‚ β”‚ 4. Users / People β”‚ β”‚ β”‚ β”‚ β”‚ β”‚ β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”‚ β”‚ β”‚ β”‚ β”‚ β”‚ β”‚ 3. Networks β”‚ β”‚ β”‚ β”‚ β”‚ β”‚ β”‚ β”‚ β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β” β”‚ β”‚ β”‚ β”‚ β”‚ β”‚ β”‚ β”‚ β”‚ 2.Systemsβ”‚ β”‚ β”‚ β”‚ β”‚ β”‚ β”‚ β”‚ β”‚ β”‚β”Œβ”€β”€β”€β”€β”€β”€β”β”‚ β”‚ β”‚ β”‚ β”‚ β”‚ β”‚ β”‚ β”‚ β”‚β”‚1.Dataβ”‚β”‚ β”‚ β”‚ β”‚ β”‚ β”‚ β”‚ β”‚ β”‚ β”‚β””β”€β”€β”€β”€β”€β”€β”˜β”‚ β”‚ β”‚ β”‚ β”‚ β”‚ β”‚ β”‚ β”‚ β””β”€β”€β”€β”€β”€β”€β”€β”€β”˜ β”‚ β”‚ β”‚ β”‚ β”‚ β”‚ β”‚ β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜ β”‚ β”‚ β”‚ β”‚ β”‚ β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜ β”‚ β”‚ β”‚ β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜ β”‚ β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

How spheres work: Controls at each outer layer protect the next inner layer. An attacker must breach all outer spheres to reach the core data. This implements defense in depth.

Example controls per sphere:

SphereControl Example
External WorldFirewalls, ISP-level filtering
EnvironmentPhysical perimeter fence, CCTV
UsersSETA training, access controls
NetworksIDS/IPS, VPN, network segmentation
SystemsAntivirus, patch management
Data (Core)Encryption, database access control
Physical Security Control Types IMP
Control TypePurposeExamples
Deterrent ControlsDiscourage attacks before they happenCCTV cameras, warning signs, security fences
Preventive ControlsPhysically block unauthorized accessLocks, biometrics, mantraps, security guards
Detective ControlsIdentify when a breach is occurringFire alarms, motion sensors, CCTV monitoring, audit logs
Corrective ControlsFix damage or stop an ongoing incidentFire suppression systems, emergency power cutoff
Recovery ControlsRestore operations after a disruptionBackup systems, alternate site, disaster recovery plans
Compensatory ControlsSubstitute when primary controls failTemporary guards, manual procedures, isolation
Hiring Process β€” Security Integration Steps IMP

A secure hiring process integrates employment policies with security practices:

StepActivitySecurity Consideration
1Define job roleIdentify security clearance level needed
2Advertise the vacancyInternal vs external hiring β€” insiders vs outsiders risk
3Receive applicationsScreen for red flags in employment history
4Shortlist candidatesVerify qualifications match security requirements
5Conduct interviewsAssess security awareness and integrity
6Background verificationCriminal history, previous employer references, identity verification
7Issue appointment letterInclude security responsibilities clause
8Onboarding trainingSecurity awareness and policy training (SETA)
9Assign access rightsPrinciple of least privilege β€” minimum access needed
10Sign security agreementsNDA, acceptable use policy, confidentiality agreements

⚑ Score 50+ Guaranteed Path

SectionMarksStrategy
Part A (2-mark Γ— 10)20All 10 compulsory β€” know short definitions
Part B (any 5 of 6 Γ— 12 or 5Γ—16)60–80Attempt 5, choose familiar topics
Total Target70+All Part A + 4 solid Part B answers
πŸ”₯ Most Likely 8/16-Mark Questions (from QP analysis)
TopicUnitAppeared
McCumber Cube + IS Components1Every end-sem
SDLC vs SecSDLC comparison13 of 5 papers
Types of threats / threat categories2Every paper
Malware types / Worms vs Viruses23 of 5 papers
Risk identification components34 of 5 papers
5 risk control strategies with decision points34 of 5 papers
CBA + items affecting cost of control33 of 5 papers
NIST SP 800-14 β€” 14 principles43 of 5 papers
PDCA Cycle (ISO 27000)4Every paper
Incident vs Disaster classification + BCP43 of 5 papers
IDPS deployment and implementation54 of 5 papers
Scanning and analysis tools54 of 5 papers
Spheres of security + Security architecture53 of 5 papers
Physical security control types53 of 5 papers
πŸ“… Study Hour Plan (3 days before exam)
DayFocusTarget
Day 1 AMUnit 1 + Unit 2All 2-marks + McCumber + Threat types + Malware
Day 1 PMUnit 3Risk components + 5 strategies + CBA formula
Day 2 AMUnit 4NIST 14 principles + PDCA + Incident/Disaster table
Day 2 PMUnit 5IDPS deployment + Scanning tools + Spheres diagram
Day 3QP practiceWrite answers for 2 past papers from QP tab
Pro Tips:
  • For any 8-mark answer: intro (1 line) + table/list body + conclusion (1 line) = full marks
  • The PDCA cycle question appears in EVERY paper β€” memorize all 4 steps with one example each
  • Write formulas (SLE, ALE, CBA) with example values β€” examiners love seeing calculations
  • For threat/malware questions, always include a comparison table β€” saves writing time
  • Diagrams for: McCumber Cube, Spheres of Security, PDCA cycle β€” practice drawing these
  • For NIST 800-14 β€” write all 14 as a numbered list with 1-line description each

CAT 1 – April 2024 Internal

U18ITT6001 Information Security | CO3, CO4, CO5 | KCT
Part A – 2 Marks each
Part B – 10 Marks each
Part C – 10 Marks each (Any 3)

Retest – April/May 2024 Internal

U18ITT6001 Information Security | CO2, CO3, CO4 | KCT
Part A – 2 Marks each
Part B – 10 Marks each
Part C – 10 Marks each (Any 3)

End Semester – April/May 2024 End Sem

U18ITT6001 Information Security | Reg 2018 | 6th Sem IT | 100 Marks
Part A – 2 Marks each (Answer all 10)
Part B – 16 Marks each (Answer any 5)

End Semester – April/May 2025 End Sem

U18ITT6001 Information Security | Reg 2018 | 6th Sem IT | 100 Marks
Part A – 2 Marks each (Answer all 10)
Part B – 16 Marks each (Answer any 5)

End Semester – November/December 2025 End Sem

U18ITT6001 Information Security | Reg 2018 | 6th Sem IT | 100 Marks
Part A – 2 Marks each (Answer all 10)
Part B – 5 Marks each (Answer all)
Part C – 12 Marks each (Answer any 5)