Introduction To InfoSecurity Policy Lecture1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

Khadi

jaAmi
nuUmar
.

I
ntr
oduct
iont
oInf
ormat
ionSecur
it
yPol
icy

CBS1203
Whati
sSecur
it
y?

Securi
tycanbedefi
nedast
hequal
i
tyorstateofbei
ngsecur
ed-
-t
o
befreefr
om danger
”Tobeprot
ect
edfrom adver
sari
es.

Asuccessf
ulor
gani
zat
ionshoul
dhav
emul
ti
plel
ayer
sofsecur
it
y
i
nplace:

1.
Physical
securit
y:Toprotectphysical
items,
obj
ect
s,orar
eas
fr
om unauthor
izedaccessandmi suse

2.
Personnel
secur
it
y:Toprotectt
heindi
vi
dualorgroupof
i
ndiv
idual
swhoareauthor
izedtoaccesstheorgani
zati
onandi
ts
oper
ati
ons

3.
Operat
ionssecur
it
y:Topr ot
ectt
hedet
ail
sofapar
ti
cul
ar
oper
ati
onorseriesofact
ivi
ti
es

4.Communicat
ionSecur
it
y:Topr
otectcommuni
cat
ionsmedi
a,
t
echnology
,andcont
ents

5.
Networksecur
it
y:Topr
otectnet
wor
kingcomponent
s,connect
ions,
andcontent
s

Informati
onsecur i
ty:
Topr ot
ecttheconf i
denti
ali
ty,
integri
tyand
av ail
abi
l
ityofinf
ormationassets,whetherinst
orage, pr
ocessing,or
transmission.
Iti
sachievedviatheapplicat
ionofpolicy,educat
ion,
traini
ngandawar eness,andtechnology.
Comput
erSecur
it
y

Whati
scomput
ersecur
it
y?

Comput ersecurit
ycanbedef inedascontr
olsthatareputinpl
ace
toprovdeConf
i identi
ali
ty,Integri
ty,Av
ail
abil
it
yf orall
component sofcomput ersy stems.Thesecomponent sincl
ude
Data,Soft
war e,
Har dware,andf ir
mware.

Har
dware:I
sthephysical
par
toft
hecomput
er,
li
ket
hesy
stem
memoryanddiskdr
ive.

Fir
mwar e:
Ist hepermanentsoftwarethatrunsthepr
ocessesof
thecomput erandismostlyi
nvisiblet
otheuser,li
ket
hestart
-up
funct
ionsthatmakeelement soft hehardwareworkt
ogether
.

Sof
tware:I
sthepr ogrammi ngthatoffer
sser
vicestotheuserand
admini
str
ator.Theoper at
ingsystem,wordprocessor,
computer
games,andInternetbrowserareallexampl
esofsof t
ware
commonlyfoundonacomput er.

Whati
sInf
ormat
ionSecur
it
y?

I
tist
heprot
ect
ionofi
nfor
mat i
onanditscri
ti
cal
element
s,i
ncl
udi
ng
t
hesyst
emsandhardwarethatuse,
store,
andtr
ansmitt
hat
i
nfor
mati
on.

Tool
s,suchaspol
i
cy,
awar
eness,
trai
ning,
educat
ion,
andt
echnol
ogy
ar
enecessary
.

Itcanal
sobedef i
nedasallmeasurest
akentopr ev
entunauthori
zed
useofel
ectroni
cdatasuchasdiscl
osur
e,al
terat
ion,subst
it
uti
on,or
destr
uct
ionofthedataconcer
ned.AndtheProvi
sionofthefoll
owing
thr
eeservi
ces:

 Confi
dent
ial
i
ty:
Conceal
mentofdat
afr
om unaut
hor
ized
par
ti
es
I
ntegr
it
y:Assur
ancet
hatdat
aisgenui
ne

 Avai
l
abili
ty:
System st
il
lfunct
ionsef
fi
cient
lyaf
tersecur
it
y
pr
ovisi
onsareinplace

Nosi
ngl
emeasur
ecanensur
ecompl
etesecur
it
y.

Whyi
sInf
ormat
ionsecur
it
yimpor
tant
?

Governments,
commerci
albusi
nesses,
andi
ndi
vi
dual
sar
eal
l
st
oringinf
ormati
onel
ect
roni
cal
ly

 Compact
,Inst
ant
aneoust
ransf
er,
easyaccess

Abi
l
ityt
ouseinf
ormati
onmoreeff
ici
ent
lyhasr
esul
tedi
nar
api
d
i
ncr
easeint
hevalueofi
nfor
mati
on

I
nfor
mati
onstor
edelectr
oni
cal
lyfacesnewandpot
ent
ial
l
ymor
e
damagi
ngsecur
it
ythreat
s:t
hatis

 Canpot
ent
ial
l
ybest
olenf
rom ar
emot
elocat
ion

 Mucheasi
ert
ointer
ceptandal t
erel
ect
roni
ccommuni
cat
ion
t
hanit
spaper
-basedpredecessors.

You might also like