Principles of InfoSec
InfoSec operates under a set of fundamental guiding principles. These form the bedrock for effective management, protection, and secure handling of sensitive data assets.
1 Core Principles (The CIA Triad)
Confidentiality
Ensures information is accessible only to those authorized to have access.
Integrity
Maintains accuracy and completeness of data over its entire lifecycle.
Availability
Ensures information is accessible to authorized users when needed.
Extended Principles
Prevents a party from denying the authenticity of their signature or message (Crucial in legal contexts).
Verifies the identity of a user, process, or device (Passwords, Biometrics, MFA).
Focuses on proper handling of sensitive personal info and compliance with regulations.
2 Security Lifecycle Processes
InfoSec involves a lifecycle of processes designed to protect data. These form the backbone of a robust strategy.
1. Risk Assessment
Identifies threats, evaluates vulnerabilities, and determines potential impact to prioritize efforts.
2. Security Planning
Develops strategies, creates policies, and allocates resources for security initiatives.
3. Implementation
Puts plans into action by deploying technical solutions and enforcing policies.
4. Monitoring & Detection
Continuously watches for security events and anomalies using tools like SIEM.
5. Incident Response
Reacts to detected incidents to contain, eradicate, and recover from threats.
6. Continuous Improvement
Reviews incidents and updates security measures based on new threats and technologies.
3 Purpose of InfoSec
4 Tools of the Trade
General Defense
- Firewalls
- IDS / IPS Systems
- SIEM Systems
- Encryption Tools
- Access Control Systems
PenTester Toolkit
- $ nmap Scanning
- $ wireshark Analysis
- $ metasploit Exploit
- $ burp-suite Web Apps
- $ john Cracking
Crucial Warning
As a penetration tester, you will be using these tools to simulate attacks. However, always ensure you have proper authorization before conducting any security tests. Unauthorized testing is illegal and unethical.