SlideShare a Scribd company logo
www.huawei.com
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Huawei Certified ICT Associate
Security v3.0
Professional Training Program
www.huawei.com
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Huawei Certified ICT Associate
Security v3.0
Instructor: Ssendi Samuel
www.huawei.com
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Basic Concepts of
Information Security
Page 3
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Foreword
 Information security is the process of ensuring safe data communication
and preventing issues such as information leakage, modification, and
disruption.
 This document describes the basic concepts and protection measures of
information security, as well as information security risks and associated
assessment and avoidance methods.
Page 4
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Objectives
 Upon completion of this course, you will be able to:
 Describe the definition and characteristics of information security.
 Explain the characteristics and differences of security models.
 Differentiate between security risks.
Page 5
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Information and Information Security
2. Information Security Risks and Management
Page 6
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Information
 information created, received, and maintained as evidence and information by an
organization or person, in pursuance of legal obligations or in the transaction of business.
--- ISO/IEC Guidelines for the Management of IT Security (GMITS)
What is information?
Books/
Letters
Emails Radar signals
State secrets
Test questions
Transaction data
Page 7
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Information Security
 Information security refers to the preservation of the confidentiality, integrity, and availability of data
through security technologies.
 These technologies include computer software and hardware, network, and key technologies.
Organizational management measures throughout the information lifecycle (generation, transmission,
exchange, processing, and storage) are also essential.
 The following will be affected if information assets are damaged:
 The aim of information security is to protect data against threats through technical means and effective
management.
National
security
System operating and
continuous development
Personal privacy
and property
Page 8
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Information Security Development
Limited communication
technologies and
dispersedly stored data
Early 1900s
Communication secrecy stage
Information-based
security replaces
traditional security
1980s
Information assurance stage
Post-1960s
Information security stage
Internet development brings
new challenges and threats to
information security
Page 9
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Photo or Information Leakage?
 After the Chinese government invited bids
for oil production equipment, Japanese
intelligence experts used this simple
photo to uncover the following secrets of
the Daqing Oilfield:
 Located between 46N and 48N, as
indicated by the clothing of Wang Jinxi
 Diameter of the oil well, inferred from the
handle rack
Page 10
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Communication Secrecy Stage
 In the early 1900s, communication technologies were underdeveloped, and data was stored
in different locations.
 Information system security was limited to physical security of information and cipher-
based security of communication (mainly stream cipher).
 As long as information was in a relatively secure place and unauthorized users were
prohibited from accessing the information, data security could be generally guaranteed.
Page 11
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Information Security Stage
 Since the 1990s, Internet technologies have developed rapidly, and information leaks have
increased.
 As a result, in addition to confidentiality, integrity and availability, information security
began to focus on more principles and objectives, such as controllability and non-
repudiation.
Confidentiality
Integrity
Availability
Controllability
Non-
repudiation
Page 12
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Information Assurance Stage
 Business-oriented information security assurance
Different service
traffic with various
risks and
protection
methods
Security system
Cohesive security
management and
technical protection;
proactive defense but
not passive protection
Management
Talent
development and
system
establishment for
security
management
Business
Page 13
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Case - WannaCry
 In 2017, the WannaCry ransomware
cryptoworm, propagated through
EternalBlue, infected over 100,000
computers, causing a loss of US$8
billion.
Energy
Government Education
Transportation
Page 14
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Case - OceanLotus
 Since April 2012, the OceanLotus group
has carried out targeted penetration and
attacks on important sectors of China,
such as the government, scientific
research institutes, maritime institutions,
maritime construction, and shipping
enterprises.
 The attacks are intended to obtain
confidential information, intercept
intelligence sent out by attacked
computers, and enable the computers to
automatically send related intelligence.
Page 15
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Discussion: What Are the Causes of Such Attacks?
Direct Cause Indirect Cause
 Virus
 Vulnerability
 Trojan horse
 Backdoor
program
 DDoS attack
 …
 Information
system
complexity
 Human and
environment
factors
Page 16
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Increasing importance
• The information network has
become the foundation of
economic prosperity, social stability,
and national development.
• Informatization profoundly
influences the global economic
integration, national strategy
adjustment, and security priorities.
• Information security has
transformed from a technical issue
into a matter of national security
worldwide.
Applicable to many
technical fields
For example:
• Command, Control,
Communications, Computers
and Intelligence (C4I) system
• E-commerce system
• Biomedical system
• Intelligent Transport System (ITS)
Significance of Building Information Security
Importance
Applicability
Page 17
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Information and Information Security
2. Information Security Risks and Management
Page 18
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Risks Involved in Information Security
Risks
Physical risks
Other risks
System risks
Information risks
Management risks
Application risks
Network risks
Page 19
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Physical Risks
 Device theft and destruction
 Link aging, man-made damage, and bite from animals
 Network device fault
 Network device unavailability due to power failure
 Electromagnetic radiation in the equipment room
Page 20
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Information Risks
 Storage security
 Transmission security
 Access security
Page 21
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Information Transmission Security
Headquarters
Branch
Enterprise business information
Tampered information
Attacker
Page 22
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Information Access Security
Intranet
Unauthorized user
Illegal login
Authorized user
Authentication
server on the
network
Page 23
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
System Risks
 Database system configuration security
 Security database
 Security of services running in the system
Page 24
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Application Risks
 Network virus
 Operating system security
 Email application security
 Web service security
 FTP service security
 DNS service security
 Business application software security
Page 25
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Network Risks
Security zone
Page 26
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Management Risks
 Determine whether the information system has management risks from the
following aspects:
National policy • Effective national information security regulations
formulated
• Specialized agency to manage information security
• Security management rules and equipment room management
system with clear responsibilities and rights
• Enterprises can establish own security management organizations
Enterprise system
• Effective security policies and high-quality security management personnel
• Effective supervision and inspection system, and adherence to rules and
regulations
Management
system
Page 27
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Significance of Information Security Management
 According to statistics, 70% of enterprise information loss is caused by negligence
or intentional leakage by internal staff.
 Security technologies are only the means to control information security. They can
only be effective with the appropriate support of management procedures.
70%
Weak
security
awareness
among
employees
Loose
authorization
rules
Non-
standard
system
operations
Malicious
data theft
Technologies 30% Management 70%
Page 28
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Current Development of Information Security
Management
Each country has introduced its own information
security development strategy and plan.
Introducing information security
development strategies and plans
Defining and standardizing information security work
through laws is the strongest guarantee for effective
implementation of security measures.
Strengthening legislation to achieve
unified and standardized management
The era of standardized and systematized information
security management began in the 1990s. ISO/IEC
27000 is the best known system.
Entering the era of standardized and
systematized management
Information Security
Management
Page 29
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Quiz
1. Information security incidents frequently occur because of security attack
methods, such as vulnerabilities, viruses, and backdoor programs.
A. True
B. False
Page 30
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Summary
 Information security development history
 Basic concepts of information security
Page 31
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Thank You
www.huawei.com

More Related Content

What's hot

5. Identity and Access Management
5. Identity and Access Management5. Identity and Access Management
5. Identity and Access Management
Sam Bowne
 
Chapter 3: Information Security Framework
Chapter 3: Information Security FrameworkChapter 3: Information Security Framework
Chapter 3: Information Security Framework
Nada G.Youssef
 
NETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGNETWORK PENETRATION TESTING
NETWORK PENETRATION TESTING
Er Vivek Rana
 
Incident Response Swimlanes
Incident Response SwimlanesIncident Response Swimlanes
Incident Response Swimlanes
Daniel P Wallace
 
Information Security Policies and Standards
Information Security Policies and StandardsInformation Security Policies and Standards
Information Security Policies and Standards
Directorate of Information Security | Ditjen Aptika
 
Basic Concepts of information security.ppt
Basic Concepts of information security.pptBasic Concepts of information security.ppt
Basic Concepts of information security.ppt
Zaheer720515
 
CISA Domain 4 Information Systems Operation | Infosectrain
CISA Domain 4 Information Systems Operation | InfosectrainCISA Domain 4 Information Systems Operation | Infosectrain
CISA Domain 4 Information Systems Operation | Infosectrain
InfosecTrain
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
Dilum Bandara
 
12 security policies
12 security policies12 security policies
12 security policies
Saqib Raza
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3
Dam Frank
 
Introduction To OWASP
Introduction To OWASPIntroduction To OWASP
Introduction To OWASPMarco Morana
 
Basic Security Requirements
Basic Security RequirementsBasic Security Requirements
Basic Security RequirementsSteven Cahill
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
Identacor
 
Information Security Management
Information Security ManagementInformation Security Management
Information Security Management
Bhadra Gowdra
 
Vulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingVulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration Testing
Yvonne Marambanyika
 
Cyber security
Cyber security Cyber security
Cyber security
Shivam Yadav
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
Edureka!
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptx
MohanPandey31
 
Basic of SSDLC
Basic of SSDLCBasic of SSDLC
Basic of SSDLC
Chitpong Wuttanan
 
The Future of Security Architecture Certification
The Future of Security Architecture CertificationThe Future of Security Architecture Certification
The Future of Security Architecture Certification
danb02
 

What's hot (20)

5. Identity and Access Management
5. Identity and Access Management5. Identity and Access Management
5. Identity and Access Management
 
Chapter 3: Information Security Framework
Chapter 3: Information Security FrameworkChapter 3: Information Security Framework
Chapter 3: Information Security Framework
 
NETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGNETWORK PENETRATION TESTING
NETWORK PENETRATION TESTING
 
Incident Response Swimlanes
Incident Response SwimlanesIncident Response Swimlanes
Incident Response Swimlanes
 
Information Security Policies and Standards
Information Security Policies and StandardsInformation Security Policies and Standards
Information Security Policies and Standards
 
Basic Concepts of information security.ppt
Basic Concepts of information security.pptBasic Concepts of information security.ppt
Basic Concepts of information security.ppt
 
CISA Domain 4 Information Systems Operation | Infosectrain
CISA Domain 4 Information Systems Operation | InfosectrainCISA Domain 4 Information Systems Operation | Infosectrain
CISA Domain 4 Information Systems Operation | Infosectrain
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
12 security policies
12 security policies12 security policies
12 security policies
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3
 
Introduction To OWASP
Introduction To OWASPIntroduction To OWASP
Introduction To OWASP
 
Basic Security Requirements
Basic Security RequirementsBasic Security Requirements
Basic Security Requirements
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Information Security Management
Information Security ManagementInformation Security Management
Information Security Management
 
Vulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingVulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration Testing
 
Cyber security
Cyber security Cyber security
Cyber security
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptx
 
Basic of SSDLC
Basic of SSDLCBasic of SSDLC
Basic of SSDLC
 
The Future of Security Architecture Certification
The Future of Security Architecture CertificationThe Future of Security Architecture Certification
The Future of Security Architecture Certification
 

Similar to 101 Basic concepts of information security

HCSCA101 Basic Concepts of Information Security.pptx
HCSCA101 Basic Concepts of Information Security.pptxHCSCA101 Basic Concepts of Information Security.pptx
HCSCA101 Basic Concepts of Information Security.pptx
JordanKinobe1
 
106 Threat defense and information security development trends
106 Threat defense and information security development trends106 Threat defense and information security development trends
106 Threat defense and information security development trends
SsendiSamuel
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
japijapi
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
talhajann43
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
ijtsrd
 
Maloney slides
Maloney slidesMaloney slides
Maloney slidesOnkar Sule
 
102 Information security standards and specifications
102 Information security standards and specifications102 Information security standards and specifications
102 Information security standards and specifications
SsendiSamuel
 
Cyber Security Education Materials.pptx
Cyber Security Education Materials.pptxCyber Security Education Materials.pptx
Cyber Security Education Materials.pptx
bentidiane21
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
IBM Security
 
Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2 Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2
Dr. Ahmed Al Zaidy
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Ramiro Cid
 
Maloney Slides
Maloney SlidesMaloney Slides
Maloney Slidesecommerce
 
Cybersecurity: Connectivity, Collaboration and Security Controls
Cybersecurity: Connectivity, Collaboration and Security ControlsCybersecurity: Connectivity, Collaboration and Security Controls
Cybersecurity: Connectivity, Collaboration and Security Controls
Kristian Alisasis Pura
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
accenture
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
accenture
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
Jeewanthi Fernando
 
Fundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest TechnologyFundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest Technology
ijtsrd
 
CCA study group
CCA study groupCCA study group
CCA study group
IIBA UK Chapter
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
Matthew Rosenquist
 

Similar to 101 Basic concepts of information security (20)

HCSCA101 Basic Concepts of Information Security.pptx
HCSCA101 Basic Concepts of Information Security.pptxHCSCA101 Basic Concepts of Information Security.pptx
HCSCA101 Basic Concepts of Information Security.pptx
 
106 Threat defense and information security development trends
106 Threat defense and information security development trends106 Threat defense and information security development trends
106 Threat defense and information security development trends
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
 
Maloney slides
Maloney slidesMaloney slides
Maloney slides
 
102 Information security standards and specifications
102 Information security standards and specifications102 Information security standards and specifications
102 Information security standards and specifications
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Cyber Security Education Materials.pptx
Cyber Security Education Materials.pptxCyber Security Education Materials.pptx
Cyber Security Education Materials.pptx
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2 Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Maloney Slides
Maloney SlidesMaloney Slides
Maloney Slides
 
Cybersecurity: Connectivity, Collaboration and Security Controls
Cybersecurity: Connectivity, Collaboration and Security ControlsCybersecurity: Connectivity, Collaboration and Security Controls
Cybersecurity: Connectivity, Collaboration and Security Controls
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
 
Fundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest TechnologyFundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest Technology
 
CCA study group
CCA study groupCCA study group
CCA study group
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 

More from SsendiSamuel

105 Common information security threats
105 Common information security threats105 Common information security threats
105 Common information security threats
SsendiSamuel
 
104 Common network devices
104 Common network devices104 Common network devices
104 Common network devices
SsendiSamuel
 
103 Basic network concepts
103 Basic network concepts103 Basic network concepts
103 Basic network concepts
SsendiSamuel
 
Chapter 06: cloud computing trends
Chapter 06: cloud computing trendsChapter 06: cloud computing trends
Chapter 06: cloud computing trends
SsendiSamuel
 
Chapter 05: introduction to virtualization features
Chapter 05: introduction to virtualization featuresChapter 05: introduction to virtualization features
Chapter 05: introduction to virtualization features
SsendiSamuel
 
Chapter 04: Storage virtualization basics
Chapter 04: Storage virtualization basicsChapter 04: Storage virtualization basics
Chapter 04: Storage virtualization basics
SsendiSamuel
 
Chapter 03: Network basics for cloud computing
Chapter 03: Network basics for cloud computingChapter 03: Network basics for cloud computing
Chapter 03: Network basics for cloud computing
SsendiSamuel
 
Chapter 01: A brief introduction to cloud computing
Chapter 01: A brief introduction to cloud computingChapter 01: A brief introduction to cloud computing
Chapter 01: A brief introduction to cloud computing
SsendiSamuel
 
Chapter 02: Introduction to compute virtualization
Chapter 02: Introduction to compute virtualizationChapter 02: Introduction to compute virtualization
Chapter 02: Introduction to compute virtualization
SsendiSamuel
 

More from SsendiSamuel (9)

105 Common information security threats
105 Common information security threats105 Common information security threats
105 Common information security threats
 
104 Common network devices
104 Common network devices104 Common network devices
104 Common network devices
 
103 Basic network concepts
103 Basic network concepts103 Basic network concepts
103 Basic network concepts
 
Chapter 06: cloud computing trends
Chapter 06: cloud computing trendsChapter 06: cloud computing trends
Chapter 06: cloud computing trends
 
Chapter 05: introduction to virtualization features
Chapter 05: introduction to virtualization featuresChapter 05: introduction to virtualization features
Chapter 05: introduction to virtualization features
 
Chapter 04: Storage virtualization basics
Chapter 04: Storage virtualization basicsChapter 04: Storage virtualization basics
Chapter 04: Storage virtualization basics
 
Chapter 03: Network basics for cloud computing
Chapter 03: Network basics for cloud computingChapter 03: Network basics for cloud computing
Chapter 03: Network basics for cloud computing
 
Chapter 01: A brief introduction to cloud computing
Chapter 01: A brief introduction to cloud computingChapter 01: A brief introduction to cloud computing
Chapter 01: A brief introduction to cloud computing
 
Chapter 02: Introduction to compute virtualization
Chapter 02: Introduction to compute virtualizationChapter 02: Introduction to compute virtualization
Chapter 02: Introduction to compute virtualization
 

Recently uploaded

TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 

Recently uploaded (20)

TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 

101 Basic concepts of information security

  • 1. www.huawei.com Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Huawei Certified ICT Associate Security v3.0 Professional Training Program
  • 2. www.huawei.com Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Huawei Certified ICT Associate Security v3.0 Instructor: Ssendi Samuel
  • 3. www.huawei.com Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Basic Concepts of Information Security
  • 4. Page 3 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Foreword  Information security is the process of ensuring safe data communication and preventing issues such as information leakage, modification, and disruption.  This document describes the basic concepts and protection measures of information security, as well as information security risks and associated assessment and avoidance methods.
  • 5. Page 4 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Objectives  Upon completion of this course, you will be able to:  Describe the definition and characteristics of information security.  Explain the characteristics and differences of security models.  Differentiate between security risks.
  • 6. Page 5 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Contents 1. Information and Information Security 2. Information Security Risks and Management
  • 7. Page 6 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Information  information created, received, and maintained as evidence and information by an organization or person, in pursuance of legal obligations or in the transaction of business. --- ISO/IEC Guidelines for the Management of IT Security (GMITS) What is information? Books/ Letters Emails Radar signals State secrets Test questions Transaction data
  • 8. Page 7 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Information Security  Information security refers to the preservation of the confidentiality, integrity, and availability of data through security technologies.  These technologies include computer software and hardware, network, and key technologies. Organizational management measures throughout the information lifecycle (generation, transmission, exchange, processing, and storage) are also essential.  The following will be affected if information assets are damaged:  The aim of information security is to protect data against threats through technical means and effective management. National security System operating and continuous development Personal privacy and property
  • 9. Page 8 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Information Security Development Limited communication technologies and dispersedly stored data Early 1900s Communication secrecy stage Information-based security replaces traditional security 1980s Information assurance stage Post-1960s Information security stage Internet development brings new challenges and threats to information security
  • 10. Page 9 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Photo or Information Leakage?  After the Chinese government invited bids for oil production equipment, Japanese intelligence experts used this simple photo to uncover the following secrets of the Daqing Oilfield:  Located between 46N and 48N, as indicated by the clothing of Wang Jinxi  Diameter of the oil well, inferred from the handle rack
  • 11. Page 10 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Communication Secrecy Stage  In the early 1900s, communication technologies were underdeveloped, and data was stored in different locations.  Information system security was limited to physical security of information and cipher- based security of communication (mainly stream cipher).  As long as information was in a relatively secure place and unauthorized users were prohibited from accessing the information, data security could be generally guaranteed.
  • 12. Page 11 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Information Security Stage  Since the 1990s, Internet technologies have developed rapidly, and information leaks have increased.  As a result, in addition to confidentiality, integrity and availability, information security began to focus on more principles and objectives, such as controllability and non- repudiation. Confidentiality Integrity Availability Controllability Non- repudiation
  • 13. Page 12 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Information Assurance Stage  Business-oriented information security assurance Different service traffic with various risks and protection methods Security system Cohesive security management and technical protection; proactive defense but not passive protection Management Talent development and system establishment for security management Business
  • 14. Page 13 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Case - WannaCry  In 2017, the WannaCry ransomware cryptoworm, propagated through EternalBlue, infected over 100,000 computers, causing a loss of US$8 billion. Energy Government Education Transportation
  • 15. Page 14 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Case - OceanLotus  Since April 2012, the OceanLotus group has carried out targeted penetration and attacks on important sectors of China, such as the government, scientific research institutes, maritime institutions, maritime construction, and shipping enterprises.  The attacks are intended to obtain confidential information, intercept intelligence sent out by attacked computers, and enable the computers to automatically send related intelligence.
  • 16. Page 15 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Discussion: What Are the Causes of Such Attacks? Direct Cause Indirect Cause  Virus  Vulnerability  Trojan horse  Backdoor program  DDoS attack  …  Information system complexity  Human and environment factors
  • 17. Page 16 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Increasing importance • The information network has become the foundation of economic prosperity, social stability, and national development. • Informatization profoundly influences the global economic integration, national strategy adjustment, and security priorities. • Information security has transformed from a technical issue into a matter of national security worldwide. Applicable to many technical fields For example: • Command, Control, Communications, Computers and Intelligence (C4I) system • E-commerce system • Biomedical system • Intelligent Transport System (ITS) Significance of Building Information Security Importance Applicability
  • 18. Page 17 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Contents 1. Information and Information Security 2. Information Security Risks and Management
  • 19. Page 18 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Risks Involved in Information Security Risks Physical risks Other risks System risks Information risks Management risks Application risks Network risks
  • 20. Page 19 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Physical Risks  Device theft and destruction  Link aging, man-made damage, and bite from animals  Network device fault  Network device unavailability due to power failure  Electromagnetic radiation in the equipment room
  • 21. Page 20 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Information Risks  Storage security  Transmission security  Access security
  • 22. Page 21 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Information Transmission Security Headquarters Branch Enterprise business information Tampered information Attacker
  • 23. Page 22 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Information Access Security Intranet Unauthorized user Illegal login Authorized user Authentication server on the network
  • 24. Page 23 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. System Risks  Database system configuration security  Security database  Security of services running in the system
  • 25. Page 24 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Application Risks  Network virus  Operating system security  Email application security  Web service security  FTP service security  DNS service security  Business application software security
  • 26. Page 25 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Network Risks Security zone
  • 27. Page 26 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Management Risks  Determine whether the information system has management risks from the following aspects: National policy • Effective national information security regulations formulated • Specialized agency to manage information security • Security management rules and equipment room management system with clear responsibilities and rights • Enterprises can establish own security management organizations Enterprise system • Effective security policies and high-quality security management personnel • Effective supervision and inspection system, and adherence to rules and regulations Management system
  • 28. Page 27 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Significance of Information Security Management  According to statistics, 70% of enterprise information loss is caused by negligence or intentional leakage by internal staff.  Security technologies are only the means to control information security. They can only be effective with the appropriate support of management procedures. 70% Weak security awareness among employees Loose authorization rules Non- standard system operations Malicious data theft Technologies 30% Management 70%
  • 29. Page 28 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Current Development of Information Security Management Each country has introduced its own information security development strategy and plan. Introducing information security development strategies and plans Defining and standardizing information security work through laws is the strongest guarantee for effective implementation of security measures. Strengthening legislation to achieve unified and standardized management The era of standardized and systematized information security management began in the 1990s. ISO/IEC 27000 is the best known system. Entering the era of standardized and systematized management Information Security Management
  • 30. Page 29 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Quiz 1. Information security incidents frequently occur because of security attack methods, such as vulnerabilities, viruses, and backdoor programs. A. True B. False
  • 31. Page 30 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Summary  Information security development history  Basic concepts of information security
  • 32. Page 31 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Thank You www.huawei.com