1- What is Information Security?
 Distinction between information and cyber security.
2- CIA Triad
Explain the three pillars of information security:
 Confidentiality
 Integrity
 Availability
3 - Security Assessment
 Asset
 Vulnerability
 Exploit
 Threat
 Risk
4- Types of Threats
Overview of common security threats:
 Malware (viruses, worms, ransomware)
 Phishing attacks
 Denial of Service (DoS) attacks
 Social engineering
5- Threat Actors
 Types
 Attack Vectors
6- Authentication and Authorization (access control)
 The importance of strong authentication mechanisms.
 Different types of authentications (passwords, biometrics, multi-factor
authentication).
 Access control principles (need-to-know basis, least privilege).
7- Encryption
 What is encryption, and why is it essential for information security?
8- Incident Response
 The importance of having an incident response plan.
Steps in the incident response process:
 Detection and analysis
 Containment
 Eradication
 Recovery
 Lessons learned
Outlines

InfoSec Concepts.pptx

  • 2.
    1- What isInformation Security?  Distinction between information and cyber security. 2- CIA Triad Explain the three pillars of information security:  Confidentiality  Integrity  Availability 3 - Security Assessment  Asset  Vulnerability  Exploit  Threat  Risk 4- Types of Threats Overview of common security threats:  Malware (viruses, worms, ransomware)  Phishing attacks  Denial of Service (DoS) attacks  Social engineering 5- Threat Actors  Types  Attack Vectors 6- Authentication and Authorization (access control)  The importance of strong authentication mechanisms.  Different types of authentications (passwords, biometrics, multi-factor authentication).  Access control principles (need-to-know basis, least privilege). 7- Encryption  What is encryption, and why is it essential for information security? 8- Incident Response  The importance of having an incident response plan. Steps in the incident response process:  Detection and analysis  Containment  Eradication  Recovery  Lessons learned Outlines