Lecture 1 - Introduction To Security
Lecture 1 - Introduction To Security
Lecture 1 - Introduction To Security
v. Loss of license
9
Key Information Security Concepts
• Risk - Risk - the probability that something can happen
10
Key Information Security Concepts
• Computer can be subject of an attack and/or the object of an
attack
– When the subject of an attack, computer is used as an
active tool to conduct attack
– When the object of an attack, computer is the entity being
attacked
11
Critical Characteristics of Information
The value of information comes from the characteristics it
possesses:
• Availability: Enables users who need to access information
to do so without interference or obstruction
12
Critical Characteristics of Information
• Confidentiality: state of preventing disclosure or exposure to
unauthorized individuals
14
Components of an Information System
• Information system (IS) is entire set of components
necessary to use information as a resource in the
organization.
• These components are normally targeted for attack by
malicious persons
– Software
– Hardware
– Data
– People
– Procedures
– Networks
15
Balancing Information Security & Access
16
Approaches to Information Security
Implementation: Bottom-Up Approach
• Grassroots effort: systems administrators attempt to
improve security of their systems
17
Approaches to Information Security
Implementation: Top-Down Approach
• Initiated by upper management
– Issue policy, procedures, and processes
18
Information Security: Senior Management
• Chief Information Officer (CIO)
– Senior technology officer
– Team leader
– Security professionals
– Systems administrators
– End users 20
Data/Information Responsibilities
• Data/Information owner: responsible for the security
and use of a particular set of information
21
Communities of Interest
• Group of individuals united by similar interests/values
within an organization
– Information security management and professionals
22
Information Security: Is it an Art or a
Science?
• Implementation of information security often described
as combination of art and science
23
Security as Art
24
Security as Science
• Dealing with technology designed to operate at high
levels of performance
26