Introduction To Information Security: Lesson Objectives
Introduction To Information Security: Lesson Objectives
Introduction To Information Security: Lesson Objectives
INTRODUCTION
James Anderson, executive consultant at Emagined Security, Inc., believes information security in an
enterprise is a “well-informed sense of assurance that the information risks and controls are in balance.” He is
not alone in his perspective. Many information security practitioners recognize that aligning information security
needs with business objectives must be the top priority.
2000 to Present
1-1 IAS 101 – Information Assurance and Security 1
CHAPTER 1:
Introduction to Information Security
• The Internet brings millions of computer networks into communication with each other—many of them
unsecured
• Ability to secure a computer’s data influenced by the security of every computer to which it is connected
• Growing threat of cyber attacks has increased the need for improved security
WHAT IS SECURITY?
• “The quality or state of being secure—to be free from danger”
• A successful organization should have multiple layers of security in place:
– Physical security
• to protect physical items, objects, or areas from unauthorized access and misuse
– Personal security
• to protect the individual or group of individuals who are authorized to access the
organization and its operations
– Operations security
• to protect the details of a particular operation or series of activities
– Communications security
• to protect communications media, technology, and content
– Network security
• to protect networking components, connections, and contents
– Information security
• to protect the confidentiality, integrity and availability of information assets, whether in
storage, processing, or transmission. It is achieved via the application of policy,
education, training and awareness, and technology.
• The protection of information and its critical elements, including systems and hardware that use, store,
and transmit that information
• Necessary tools: policy, awareness, training, education, technology
• C.I.A. triangle
– Was standard based on confidentiality, integrity, and availability
– Now expanded into list of critical characteristics of information
Activity 2. Research
Using the Web, find out more about Kevin Mitnick. What did he do? Who caught him? Write a short summary
of his activities and explain why he is infamous.
NAME: ______________________________________ COURSE & YEAR: ___________________
1. Do you think this event was caused by an insider or outsider? Why do you think this?
2. Other than installing virus and worm control software, what can SLS do to prepare for the next incident?
3. Do you think this attack was the result of a virus or a worm? Why do you think this?
Activity 2. Research