SlideShare a Scribd company logo
1 of 20
Download to read offline
Modifications by Dr. Trad Almalahmeh
Principles of Information Security, 4th Edition
1
Upon completion of this material, you should be able to:
 Understand the definition of information security
 Understand the key terms and critical concepts of
information security
 Comprehend the history of computer security and how
it evolved into information security
Principles of Information Security,
4th Edition 2
 Information System (IS) is an entire set of software,
hardware, data, people, procedures, and networks
necessary to use information as a resource in the
organization
Principles of Information Security,
4th Edition 3
 The value of information comes from the
characteristics it possesses:
◦ Confidentiality: self-explanatory
◦ Integrity: (Bitwise) identical to the original
◦ Availability: of info, services, etc.
◦ Authenticity: “it is what it claims to be”
◦ Accuracy: free from mistakes and errors
◦ Utility: self-explanatory
◦ Possession: different from confidentiality
 Other characteristics: user authentication, auditability,
non-repudiation
Principles of Information Security,
4th Edition 4
 Definition
“The quality or state of being secure - to be free from
danger”
 A successful organization should have multiple layers
of security in place:
◦ Physical security
◦ Personal security
◦ Operations security
◦ Communications security
◦ Network security
◦ Information security
Principles of Information Security,
4th Edition 5
 The protection of information and its critical elements,
including systems that use, store, and transmit that
information
 Necessary tools: policy, awareness, training,
education, technology
Principles of Information Security,
4th Edition 6
Principles of Information Security,
4th Edition 7
 Computer (software and hardware) is the key component in
an information system
 Computer can be subject of an attack and/or the object of an
attack
◦ When the subject of an attack, computer is used as an active tool to
conduct attack
◦ When the object of an attack, computer is the entity being attacked
Principles of Information Security,
4th Edition 8
Principles of Information Security,
4th Edition 9
 Impossible to obtain perfect security - it is a process,
not an absolute
 Security should be considered balance between
protection and availability
 To achieve balance, level of security must allow
reasonable access, yet protect against threats
Principles of Information Security,
4th Edition 10
Principles of Information Security,
4th Edition 11
 Began immediately after the first mainframes were
developed
 Groups developing code-breaking computations during
World War II created the first modern computers
Principles of Information Security,
4th Edition 12
Principles of Information Security,
4th Edition 13
 Advanced Research Procurement Agency (ARPA)
began to examine feasibility of redundant networked
communications
 Larry Roberts developed ARPANET from its inception
Principles of Information Security,
4th Edition 14
Principles of Information Security,
4th Edition 15
 ARPANET grew in popularity as did its potential for misuse
 Fundamental problems with ARPANET security were
identified
◦ No safety procedures for dial-up connections to ARPANET
◦ Non-existent user identification and authorization to system
 Late 1970s: microprocessor expanded computing
capabilities and security threats
Principles of Information Security,
4th Edition 16
 Information security began with Rand Report R-609
(paper that started the study of computer security)
 Scope of computer security grew from physical
security to include:
◦ Safety of data
◦ Limiting unauthorized access to data
◦ Involvement of personnel from multiple levels of an
organization
Principles of Information Security,
4th Edition 17
 Networks of computers became more common; so too did
the need to interconnect networks
 Internet became first manifestation of a global network of
networks
 In early Internet deployments, security was treated as a low
priority
Principles of Information Security,
4th Edition 18
 The Internet brings millions of computer networks into
communication with each other -many of them
unsecured
 Ability to secure a computer’s data influenced by the
security of every computer to which it is connected
 The same problems apply for emerging networked
computer systems, e.g., smartphones
Principles of Information Security,
4th Edition 19
 Information security is a “well-informed sense of
assurance that the information risks and controls are in
balance.”
 Security should be considered a balance between
protection and availability
 Computer security began immediately after first
mainframes were developed
Principles of Information Security,
4th Edition 20

More Related Content

What's hot

Segurity and cybersegurity of information systems
Segurity and cybersegurity of information systemsSegurity and cybersegurity of information systems
Segurity and cybersegurity of information systemsvalentina jaimes duran
 
60304756 whitman-ch01-1
60304756 whitman-ch01-160304756 whitman-ch01-1
60304756 whitman-ch01-1UDCNTT
 
Smart city project's Information Security challenges
Smart city project's Information Security challenges              Smart city project's Information Security challenges
Smart city project's Information Security challenges Behak Kangarloo
 
Network security
Network securityNetwork security
Network securityhajra azam
 
Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2MLG College of Learning, Inc
 
Infromation Assurance
Infromation AssuranceInfromation Assurance
Infromation AssuranceAkshay Pal
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityKumawat Dharmpal
 
security and ethical challenges in information systems
security and ethical challenges in information systemssecurity and ethical challenges in information systems
security and ethical challenges in information systemshilal12
 
Hackon journal international
Hackon journal internationalHackon journal international
Hackon journal internationalHakon eJournal
 
Cia security model
Cia security modelCia security model
Cia security modelImran Ahmed
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
Infomation security
Infomation securityInfomation security
Infomation securityMeet Soni
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to securityDhani Ahmad
 
Information security challenges in today’s banking environment
Information security challenges in today’s banking environmentInformation security challenges in today’s banking environment
Information security challenges in today’s banking environmentEvan Francen
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issuesHaseeb Ahmed Awan
 

What's hot (20)

Segurity and cybersegurity of information systems
Segurity and cybersegurity of information systemsSegurity and cybersegurity of information systems
Segurity and cybersegurity of information systems
 
22 need-for-security
22  need-for-security22  need-for-security
22 need-for-security
 
60304756 whitman-ch01-1
60304756 whitman-ch01-160304756 whitman-ch01-1
60304756 whitman-ch01-1
 
Smart city project's Information Security challenges
Smart city project's Information Security challenges              Smart city project's Information Security challenges
Smart city project's Information Security challenges
 
Network security
Network securityNetwork security
Network security
 
Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2
 
Infromation Assurance
Infromation AssuranceInfromation Assurance
Infromation Assurance
 
Ch01
Ch01Ch01
Ch01
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
security and ethical challenges in information systems
security and ethical challenges in information systemssecurity and ethical challenges in information systems
security and ethical challenges in information systems
 
Hackon journal international
Hackon journal internationalHackon journal international
Hackon journal international
 
Cia security model
Cia security modelCia security model
Cia security model
 
Network security
Network securityNetwork security
Network security
 
Cyber Security Briefing
Cyber Security BriefingCyber Security Briefing
Cyber Security Briefing
 
Ppt.1
Ppt.1Ppt.1
Ppt.1
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Infomation security
Infomation securityInfomation security
Infomation security
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to security
 
Information security challenges in today’s banking environment
Information security challenges in today’s banking environmentInformation security challenges in today’s banking environment
Information security challenges in today’s banking environment
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issues
 

Viewers also liked (9)

Presentation
PresentationPresentation
Presentation
 
#1 wma background and overview
#1 wma background and overview#1 wma background and overview
#1 wma background and overview
 
Gerry Huber: RAP & RAS
Gerry Huber: RAP & RASGerry Huber: RAP & RAS
Gerry Huber: RAP & RAS
 
#2 mix design procedures
#2 mix design procedures#2 mix design procedures
#2 mix design procedures
 
Fpwe2016 warm mix presentation
Fpwe2016 warm mix presentationFpwe2016 warm mix presentation
Fpwe2016 warm mix presentation
 
Презентация Теплого Асфальта по технологии Evotherm 3G
Презентация Теплого Асфальта по технологии Evotherm 3GПрезентация Теплого Асфальта по технологии Evotherm 3G
Презентация Теплого Асфальта по технологии Evotherm 3G
 
Joe Peterson
Joe PetersonJoe Peterson
Joe Peterson
 
Abhishek sagar 121vc00235
Abhishek sagar 121vc00235Abhishek sagar 121vc00235
Abhishek sagar 121vc00235
 
Warm Mix Asphalt Pavement Design
Warm Mix Asphalt Pavement DesignWarm Mix Asphalt Pavement Design
Warm Mix Asphalt Pavement Design
 

Similar to Is ch1 (2)

IT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesIT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesAsst.prof M.Gokilavani
 
IT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdfIT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdfAsst.prof M.Gokilavani
 
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMSDEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMSIJNSA Journal
 
information-security-3rd-edition2-define-information-security.ppt
information-security-3rd-edition2-define-information-security.pptinformation-security-3rd-edition2-define-information-security.ppt
information-security-3rd-edition2-define-information-security.pptMuhammadAbdullah311866
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityBryCunal
 
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS IJNSA Journal
 
Ch01_Introduction_to_Information_Securit.ppt
Ch01_Introduction_to_Information_Securit.pptCh01_Introduction_to_Information_Securit.ppt
Ch01_Introduction_to_Information_Securit.pptTayyab AlEe
 
Ch01_Introduction_to_Information_Securit.ppt
Ch01_Introduction_to_Information_Securit.pptCh01_Introduction_to_Information_Securit.ppt
Ch01_Introduction_to_Information_Securit.pptTayyab AlEe
 
RaoNayakShelve inNetworkingSecurityUser levelB.docx
RaoNayakShelve inNetworkingSecurityUser levelB.docxRaoNayakShelve inNetworkingSecurityUser levelB.docx
RaoNayakShelve inNetworkingSecurityUser levelB.docxaudeleypearl
 
Information Security : Is it an Art or a Science
Information Security : Is it an Art or a ScienceInformation Security : Is it an Art or a Science
Information Security : Is it an Art or a SciencePankaj Rane
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptxKnownId
 
1_Introduction to security.pptx
1_Introduction to security.pptx1_Introduction to security.pptx
1_Introduction to security.pptxdiaa46
 
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdfControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdfsulu98
 

Similar to Is ch1 (2) (20)

Lecture 1-2.pdf
Lecture 1-2.pdfLecture 1-2.pdf
Lecture 1-2.pdf
 
IT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesIT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notes
 
IT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdfIT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdf
 
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMSDEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS
 
information-security-3rd-edition2-define-information-security.ppt
information-security-3rd-edition2-define-information-security.pptinformation-security-3rd-edition2-define-information-security.ppt
information-security-3rd-edition2-define-information-security.ppt
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS
 
Ch01_Introduction_to_Information_Securit.ppt
Ch01_Introduction_to_Information_Securit.pptCh01_Introduction_to_Information_Securit.ppt
Ch01_Introduction_to_Information_Securit.ppt
 
Ch01_Introduction_to_Information_Securit.ppt
Ch01_Introduction_to_Information_Securit.pptCh01_Introduction_to_Information_Securit.ppt
Ch01_Introduction_to_Information_Securit.ppt
 
Forensics
ForensicsForensics
Forensics
 
RaoNayakShelve inNetworkingSecurityUser levelB.docx
RaoNayakShelve inNetworkingSecurityUser levelB.docxRaoNayakShelve inNetworkingSecurityUser levelB.docx
RaoNayakShelve inNetworkingSecurityUser levelB.docx
 
Information Security : Is it an Art or a Science
Information Security : Is it an Art or a ScienceInformation Security : Is it an Art or a Science
Information Security : Is it an Art or a Science
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
CRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITYCRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITY
 
1_Introduction to security.pptx
1_Introduction to security.pptx1_Introduction to security.pptx
1_Introduction to security.pptx
 
internet security and cyber lawUnit1
internet security and  cyber lawUnit1internet security and  cyber lawUnit1
internet security and cyber lawUnit1
 
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdfControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
 
MIS 7.pptx
MIS 7.pptxMIS 7.pptx
MIS 7.pptx
 
INT 1010 05-1.pdf
INT 1010 05-1.pdfINT 1010 05-1.pdf
INT 1010 05-1.pdf
 
Ijcatr04061002
Ijcatr04061002Ijcatr04061002
Ijcatr04061002
 

Recently uploaded

Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfOnline Income Engine
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 DelhiCall Girls in Delhi
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 

Recently uploaded (20)

Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdf
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 

Is ch1 (2)

  • 1. Modifications by Dr. Trad Almalahmeh Principles of Information Security, 4th Edition 1
  • 2. Upon completion of this material, you should be able to:  Understand the definition of information security  Understand the key terms and critical concepts of information security  Comprehend the history of computer security and how it evolved into information security Principles of Information Security, 4th Edition 2
  • 3.  Information System (IS) is an entire set of software, hardware, data, people, procedures, and networks necessary to use information as a resource in the organization Principles of Information Security, 4th Edition 3
  • 4.  The value of information comes from the characteristics it possesses: ◦ Confidentiality: self-explanatory ◦ Integrity: (Bitwise) identical to the original ◦ Availability: of info, services, etc. ◦ Authenticity: “it is what it claims to be” ◦ Accuracy: free from mistakes and errors ◦ Utility: self-explanatory ◦ Possession: different from confidentiality  Other characteristics: user authentication, auditability, non-repudiation Principles of Information Security, 4th Edition 4
  • 5.  Definition “The quality or state of being secure - to be free from danger”  A successful organization should have multiple layers of security in place: ◦ Physical security ◦ Personal security ◦ Operations security ◦ Communications security ◦ Network security ◦ Information security Principles of Information Security, 4th Edition 5
  • 6.  The protection of information and its critical elements, including systems that use, store, and transmit that information  Necessary tools: policy, awareness, training, education, technology Principles of Information Security, 4th Edition 6
  • 7. Principles of Information Security, 4th Edition 7
  • 8.  Computer (software and hardware) is the key component in an information system  Computer can be subject of an attack and/or the object of an attack ◦ When the subject of an attack, computer is used as an active tool to conduct attack ◦ When the object of an attack, computer is the entity being attacked Principles of Information Security, 4th Edition 8
  • 9. Principles of Information Security, 4th Edition 9
  • 10.  Impossible to obtain perfect security - it is a process, not an absolute  Security should be considered balance between protection and availability  To achieve balance, level of security must allow reasonable access, yet protect against threats Principles of Information Security, 4th Edition 10
  • 11. Principles of Information Security, 4th Edition 11
  • 12.  Began immediately after the first mainframes were developed  Groups developing code-breaking computations during World War II created the first modern computers Principles of Information Security, 4th Edition 12
  • 13. Principles of Information Security, 4th Edition 13
  • 14.  Advanced Research Procurement Agency (ARPA) began to examine feasibility of redundant networked communications  Larry Roberts developed ARPANET from its inception Principles of Information Security, 4th Edition 14
  • 15. Principles of Information Security, 4th Edition 15
  • 16.  ARPANET grew in popularity as did its potential for misuse  Fundamental problems with ARPANET security were identified ◦ No safety procedures for dial-up connections to ARPANET ◦ Non-existent user identification and authorization to system  Late 1970s: microprocessor expanded computing capabilities and security threats Principles of Information Security, 4th Edition 16
  • 17.  Information security began with Rand Report R-609 (paper that started the study of computer security)  Scope of computer security grew from physical security to include: ◦ Safety of data ◦ Limiting unauthorized access to data ◦ Involvement of personnel from multiple levels of an organization Principles of Information Security, 4th Edition 17
  • 18.  Networks of computers became more common; so too did the need to interconnect networks  Internet became first manifestation of a global network of networks  In early Internet deployments, security was treated as a low priority Principles of Information Security, 4th Edition 18
  • 19.  The Internet brings millions of computer networks into communication with each other -many of them unsecured  Ability to secure a computer’s data influenced by the security of every computer to which it is connected  The same problems apply for emerging networked computer systems, e.g., smartphones Principles of Information Security, 4th Edition 19
  • 20.  Information security is a “well-informed sense of assurance that the information risks and controls are in balance.”  Security should be considered a balance between protection and availability  Computer security began immediately after first mainframes were developed Principles of Information Security, 4th Edition 20